Analysis
-
max time kernel
4294183s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 19:22
Static task
static1
Behavioral task
behavioral1
Sample
SatoshiSwap-App-v2.exe
Resource
win7-20220310-en
windows7_x64
0 signatures
0 seconds
General
-
Target
SatoshiSwap-App-v2.exe
-
Size
124.6MB
-
MD5
17048c8d6cb4baec3abf6db9599ebf79
-
SHA1
006526cd993f601fce45e67ea064123b8f375a58
-
SHA256
07242afbba0db9865cee6c4327130c7753fb9ce3623920b895a353b38c3c417a
-
SHA512
35a1efbe7a0c1dfa1d02e962ee0f6314f920c8498cdfbb0eae3112a00afaaac2a6256519ab99f015f4103f027a67e0971881209c5cb8562ce984c4103367e29c
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 956 AtomicParsley.exe 1964 topoedit.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 SatoshiSwap-App-v2.exe 1988 SatoshiSwap-App-v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 956 1988 SatoshiSwap-App-v2.exe 29 PID 1988 wrote to memory of 956 1988 SatoshiSwap-App-v2.exe 29 PID 1988 wrote to memory of 956 1988 SatoshiSwap-App-v2.exe 29 PID 1988 wrote to memory of 956 1988 SatoshiSwap-App-v2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SatoshiSwap-App-v2.exe"C:\Users\Admin\AppData\Local\Temp\SatoshiSwap-App-v2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\MLO\AtomicParsley.exeC:\Users\Admin\AppData\Roaming\MLO\AtomicParsley.exe2⤵
- Executes dropped EXE
PID:956
-
-
C:\Users\Admin\AppData\Roaming\MLO\topoedit.exeC:\Users\Admin\AppData\Roaming\MLO\topoedit.exe2⤵
- Executes dropped EXE
PID:1964
-