Analysis
-
max time kernel
94s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-01-2021 08:14
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_COPY00993Payment_advic4555pdf.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SWIFT_COPY00993Payment_advic4555pdf.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
SWIFT_COPY00993Payment_advic4555pdf.exe
-
Size
2.9MB
-
MD5
344811104b9deac44b95852d3dbf89ec
-
SHA1
9ab4420fc25c66fca63aa43f17fcb956def07433
-
SHA256
18da6bd51f14bd9ffca136121586de47bad598fb4652f9a48044290377fcec61
-
SHA512
ae28492c462447ff2856682080d8b68a9cb8394900431a37c58bcd959df90037c237220269db0bbdef03b5111327c8ec5ff57b683552e1886d05e034679a900e
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3036 alspeed.exe 1336 alspeed.exe -
resource yara_rule behavioral2/memory/1336-26-0x0000000000B00000-0x0000000000ED7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\alspeed = "C:\\Users\\Admin\\AppData\\Roaming\\alspeed.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 1336 3036 alspeed.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 2372 1336 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 3036 alspeed.exe 3036 alspeed.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3636 SWIFT_COPY00993Payment_advic4555pdf.exe Token: SeDebugPrivilege 3036 alspeed.exe Token: SeRestorePrivilege 2372 WerFault.exe Token: SeBackupPrivilege 2372 WerFault.exe Token: SeDebugPrivilege 2372 WerFault.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3636 wrote to memory of 1980 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 78 PID 3636 wrote to memory of 1980 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 78 PID 3636 wrote to memory of 1980 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 78 PID 1980 wrote to memory of 2156 1980 cmd.exe 80 PID 1980 wrote to memory of 2156 1980 cmd.exe 80 PID 1980 wrote to memory of 2156 1980 cmd.exe 80 PID 3636 wrote to memory of 3036 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 81 PID 3636 wrote to memory of 3036 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 81 PID 3636 wrote to memory of 3036 3636 SWIFT_COPY00993Payment_advic4555pdf.exe 81 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82 PID 3036 wrote to memory of 1336 3036 alspeed.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY00993Payment_advic4555pdf.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY00993Payment_advic4555pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "alspeed" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\alspeed.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "alspeed" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\alspeed.exe"3⤵
- Adds Run key to start application
PID:2156
-
-
-
C:\Users\Admin\AppData\Roaming\alspeed.exe"C:\Users\Admin\AppData\Roaming\alspeed.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\alspeed.exe"C:\Users\Admin\AppData\Roaming\alspeed.exe"3⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 1964⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-