Analysis
-
max time kernel
146s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20220721-en
General
-
Target
Swift Copy.exe
-
Size
971KB
-
MD5
480994b2aba1ea6c8c72aeda3db6c64a
-
SHA1
29b9246b2d927fddd0d0fff372e564dde7292409
-
SHA256
2a0d6ebfcca611f4249d12ea9fbf3b8bf44729d9db9ecfd0f43c72946febca24
-
SHA512
736678e599d60c5375681b27e65aecae99e7350c81ffeb8d9d7073be17ccb7fee800e3779f3f8c43e46cbb8d3a3713df2700af235970f5610ce882543fd9a9e6
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3272-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
Swift Copy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Swift Copy.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Swift Copy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation Swift Copy.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Swift Copy.exedescription pid process target process PID 3296 set thread context of 3272 3296 Swift Copy.exe Swift Copy.exe -
Drops file in Program Files directory 57 IoCs
Processes:
Swift Copy.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE Swift Copy.exe -
Drops file in Windows directory 1 IoCs
Processes:
Swift Copy.exedescription ioc process File opened for modification C:\Windows\svchost.com Swift Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Swift Copy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Swift Copy.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Swift Copy.exepid process 3296 Swift Copy.exe 3296 Swift Copy.exe 3296 Swift Copy.exe 3296 Swift Copy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Swift Copy.exedescription pid process Token: SeDebugPrivilege 3296 Swift Copy.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Swift Copy.exedescription pid process target process PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe PID 3296 wrote to memory of 3272 3296 Swift Copy.exe Swift Copy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"2⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:3272
-