Analysis
-
max time kernel
111s -
max time network
22s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 13:38
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_COPY.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SWIFT_COPY.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
SWIFT_COPY.exe
-
Size
1.1MB
-
MD5
52862946ab473edb24310638e680f352
-
SHA1
19be1f62b40398ffb074397ef6fb797377228a6b
-
SHA256
8fcc1d5411f20280e9e142e535fb622aa55d6117030c1644032e5e2e709ef98a
-
SHA512
f4f1f0b784c3318932ce4eee4c1f5ec0f29d1adbe77b7986cd5276b29601a17bd683e7bc94ac626cea3a8733c58acbb06e6c07bb510f1634792ef0f3fbf03eb2
Score
10/10
Malware Config
Extracted
Family
agenttesla
C2
https://api.telegram.org/bot1437981864:AAFmXsejy8kUC_pj3BwrEvAeb2cv12XMVZI/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1628-66-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1628-67-0x000000000043775E-mapping.dmp family_agenttesla behavioral1/memory/1628-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SWIFT_COPY.exedescription pid process target process PID 1088 set thread context of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SWIFT_COPY.exepid process 1628 SWIFT_COPY.exe 1628 SWIFT_COPY.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SWIFT_COPY.exedescription pid process Token: SeDebugPrivilege 1628 SWIFT_COPY.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SWIFT_COPY.exedescription pid process target process PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe PID 1088 wrote to memory of 1628 1088 SWIFT_COPY.exe SWIFT_COPY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT_COPY.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-