Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20220721-en
General
-
Target
Swift Copy.exe
-
Size
971KB
-
MD5
480994b2aba1ea6c8c72aeda3db6c64a
-
SHA1
29b9246b2d927fddd0d0fff372e564dde7292409
-
SHA256
2a0d6ebfcca611f4249d12ea9fbf3b8bf44729d9db9ecfd0f43c72946febca24
-
SHA512
736678e599d60c5375681b27e65aecae99e7350c81ffeb8d9d7073be17ccb7fee800e3779f3f8c43e46cbb8d3a3713df2700af235970f5610ce882543fd9a9e6
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4704-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
Swift Copy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Swift Copy.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Swift Copy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation Swift Copy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Swift Copy.exedescription pid process target process PID 4368 set thread context of 4704 4368 Swift Copy.exe Swift Copy.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Swift Copy.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MID1AD~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13163~1.19\MICROS~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MIF4FD~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MICROS~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MICROS~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MIA062~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe Swift Copy.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe Swift Copy.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe Swift Copy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe Swift Copy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe Swift Copy.exe File opened for modification C:\PROGRA~2\MICROS~1\Temp\EU39.tmp\MICROS~4.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Swift Copy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE Swift Copy.exe -
Drops file in Windows directory 1 IoCs
Processes:
Swift Copy.exedescription ioc process File opened for modification C:\Windows\svchost.com Swift Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Swift Copy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Swift Copy.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Swift Copy.exepid process 4368 Swift Copy.exe 4368 Swift Copy.exe 4368 Swift Copy.exe 4368 Swift Copy.exe 4368 Swift Copy.exe 4368 Swift Copy.exe 4368 Swift Copy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Swift Copy.exedescription pid process Token: SeDebugPrivilege 4368 Swift Copy.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Swift Copy.exedescription pid process target process PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe PID 4368 wrote to memory of 4704 4368 Swift Copy.exe Swift Copy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"2⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:4704
-