Euro_swift_pdf.exe

General
Target

Euro_swift_pdf.exe

Filesize

247KB

Completed

19-08-2021 10:08

Score
10/10
MD5

113dce66c3dbdcd17f9d193c883e983e

SHA1

0c9097e98f090d10597fdcac72f729fb76a219b2

SHA256

b8344e9c1ee03f949c70959828a08e1f73f198d58e6721b95676d54a7e6cb6be

Malware Config
Signatures 12

Filter: none

Collection
Credential Access
Defense Evasion
Discovery
Persistence
  • Detect Neshta Payload

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/1332-63-0x0000000000400000-0x000000000041B000-memory.dmpfamily_neshta
  • Modifies system executable filetype association
    Euro_swift_pdf.exe

    TTPs

    Modify RegistryChange Default File Association

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"Euro_swift_pdf.exe
  • Neshta

    Description

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Loads dropped DLL
    Euro_swift_pdf.exe

    Reported IOCs

    pidprocess
    1332Euro_swift_pdf.exe
    1332Euro_swift_pdf.exe
    1332Euro_swift_pdf.exe
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Suspicious use of SetThreadContext
    Euro_swift_pdf.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 2028 set thread context of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
  • Drops file in Program Files directory
    Euro_swift_pdf.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\XLICONS.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\WMPDMC.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WINDOW~1\wab.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~4.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GO664E~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MOZILL~1\MAINTE~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ieinstal.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOBD5D~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOF5E2~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\WINWORD.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WI4223~1\sidebar.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmprph.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Temp\GUME011.tmp\GOFB2B~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\PPTICO.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSOUC.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\WORDICON.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\INTERN~1\ielowutil.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\DISABL~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\setup_wm.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Google\Update\1335~1.452\GOOGLE~2.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\OIS.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\GRAPH.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\misc.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WI54FB~1\wmpshare.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\WINDOW~4\ImagingDevices.exeEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXEEuro_swift_pdf.exe
    File opened for modificationC:\PROGRA~2\MICROS~1\Office14\BCSSync.exeEuro_swift_pdf.exe
  • Drops file in Windows directory
    Euro_swift_pdf.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\svchost.comEuro_swift_pdf.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Modifies registry class
    Euro_swift_pdf.exe

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*"Euro_swift_pdf.exe
  • Suspicious behavior: MapViewOfSection
    Euro_swift_pdf.exe

    Reported IOCs

    pidprocess
    2028Euro_swift_pdf.exe
  • Suspicious use of WriteProcessMemory
    Euro_swift_pdf.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 2028 wrote to memory of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
    PID 2028 wrote to memory of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
    PID 2028 wrote to memory of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
    PID 2028 wrote to memory of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
    PID 2028 wrote to memory of 13322028Euro_swift_pdf.exeEuro_swift_pdf.exe
Processes 2
  • C:\Users\Admin\AppData\Local\Temp\Euro_swift_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Euro_swift_pdf.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: MapViewOfSection
    Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\Euro_swift_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Euro_swift_pdf.exe"
      Modifies system executable filetype association
      Loads dropped DLL
      Drops file in Program Files directory
      Drops file in Windows directory
      Modifies registry class
      PID:1332
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
    Execution
      Exfiltration
        Impact
          Initial Access
            Lateral Movement
              Privilege Escalation
                Replay Monitor
                00:00 00:00
                Downloads
                • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

                  MD5

                  9e2b9928c89a9d0da1d3e8f4bd96afa7

                  SHA1

                  ec66cda99f44b62470c6930e5afda061579cde35

                  SHA256

                  8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

                  SHA512

                  2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

                • \PROGRA~2\Google\Temp\GUME011.tmp\GOFB2B~1.EXE

                  MD5

                  583ff3367e050c4d62bc03516473b40a

                  SHA1

                  6aa1d26352b78310e711884829c35a69ed1bf0f9

                  SHA256

                  6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

                  SHA512

                  e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

                • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE

                  MD5

                  583ff3367e050c4d62bc03516473b40a

                  SHA1

                  6aa1d26352b78310e711884829c35a69ed1bf0f9

                  SHA256

                  6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

                  SHA512

                  e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

                • memory/1332-60-0x00000000004080E4-mapping.dmp

                • memory/1332-63-0x0000000000400000-0x000000000041B000-memory.dmp

                • memory/1332-61-0x00000000765F1000-0x00000000765F3000-memory.dmp

                • memory/2028-62-0x00000000000F0000-0x00000000000F2000-memory.dmp