Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:15
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY.exe
Resource
win7-20220414-en
General
-
Target
SWIFT COPY.exe
-
Size
581KB
-
MD5
da742ece94ba3ede7902f700f0f09954
-
SHA1
b9983af1eb41fee6a0bbefc06e0e263ebf1291ba
-
SHA256
28ddf0fa7f44508ea2b7c6f2de45496e5a031aa84d095c0b8c14732173073fc7
-
SHA512
95d4e5c639878043d89c8f26d4e876bb3d83728e757e61a9a9f96d0a13dc936dcd28072083552b78e382241793af63cfbbabdaf1367cddd21b3c1413bceabc3a
Malware Config
Extracted
formbook
3.9
ch62
priceground.com
protmaxvigilancia.com
allyboom.com
calimerkids.com
behproject.com
everxs.com
peertopeervaluetrading.com
asosdiscountscode.com
supersoloblitz.com
allindiaexpo.com
mountainpunks.com
lawberrys.com
myinsuranceclaimconsultants.com
autoberles.center
xn--circuitomioulla-7qb.com
beheartratemonitoringkey.live
bigcitypillows.com
tresriosresortoffers.com
ratmanrodentremoval.com
fujiaseed.com
140117.com
babyandkidexpo.com
bolduan-electronic.com
unreadytowear.com
portsaid.today
5oo50042.com
qiangbaoshou.net
hoptovine.com
coastalchiropracticcoverage.com
abeabogado.com
dancourvilleclhev.com
opebet915.com
justin-freeman.com
foodpursuits.com
pinjuanbao.com
900gamecz.com
andelmanconsulting.com
milandicic.com
airexpertservices.com
leaginac.com
strongzhen.com
gaikokujin-jinzai.com
runtu.ltd
cruisia.com
violaperitivo.com
amulyakandikonda.com
shorelaketampa.com
evyandella.com
robertodammora.info
micro-fut.com
caminhosdoacre.com
mikifamily.com
wellsassistancefargoalert.com
coyo.ltd
aldeiaterra.com
wishfuldreamnewportnews.com
maker-cnc.com
ruralvia2acceso.net
freetraffic2updatesall.win
pub-sora.com
vizcaps.com
yychsm.com
ayudameperu.com
smyeocut.win
mansiobok3.info
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5076-134-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/5076-139-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/892-145-0x0000000001040000-0x000000000106A000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SWIFT COPY.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SWIFT COPY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SWIFT COPY.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
SWIFT COPY.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SWIFT COPY.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 SWIFT COPY.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
SWIFT COPY.exeSWIFT COPY.exeWWAHost.exedescription pid process target process PID 4476 set thread context of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 5076 set thread context of 2812 5076 SWIFT COPY.exe Explorer.EXE PID 5076 set thread context of 2812 5076 SWIFT COPY.exe Explorer.EXE PID 892 set thread context of 2812 892 WWAHost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
SWIFT COPY.exeSWIFT COPY.exeWWAHost.exepid process 4476 SWIFT COPY.exe 4476 SWIFT COPY.exe 4476 SWIFT COPY.exe 4476 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe 892 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2812 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
SWIFT COPY.exeWWAHost.exepid process 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 5076 SWIFT COPY.exe 892 WWAHost.exe 892 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SWIFT COPY.exeSWIFT COPY.exeWWAHost.exedescription pid process Token: SeDebugPrivilege 4476 SWIFT COPY.exe Token: SeDebugPrivilege 5076 SWIFT COPY.exe Token: SeDebugPrivilege 892 WWAHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SWIFT COPY.exeExplorer.EXEWWAHost.exedescription pid process target process PID 4476 wrote to memory of 3464 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 3464 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 3464 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 3580 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 3580 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 3580 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 4476 wrote to memory of 5076 4476 SWIFT COPY.exe SWIFT COPY.exe PID 2812 wrote to memory of 892 2812 Explorer.EXE WWAHost.exe PID 2812 wrote to memory of 892 2812 Explorer.EXE WWAHost.exe PID 2812 wrote to memory of 892 2812 Explorer.EXE WWAHost.exe PID 892 wrote to memory of 1816 892 WWAHost.exe cmd.exe PID 892 wrote to memory of 1816 892 WWAHost.exe cmd.exe PID 892 wrote to memory of 1816 892 WWAHost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"{path}"3⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"{path}"3⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"3⤵PID:1816