Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Swift Copy.exe
Resource
win10v2004-20220812-en
General
-
Target
Swift Copy.exe
-
Size
698KB
-
MD5
0a99061b72976690d691965f3f769029
-
SHA1
0f18e36ba4f9c237a581d84b1c432e057bdbf640
-
SHA256
22ec78245f539dccb24499087dc288cc5f32a12c1871bc4b098896566439706a
-
SHA512
b9b8c21b492dd21ae2e8be13825e7a6b56d6cb36fff53070f27d0710515cce2693d19234152c0931971fd43af4688aab04363e5fdd24397d16bc8fec8bdcf23c
-
SSDEEP
6144:EfeWkoOdCpoajJRvwDVkwZdLLQJdWoLiA0Z1GGoxaKbHk4IxlY3/6UP453hrKLhX:9iAtdLUXOTZEEKbERs3iUP45RrucP
Malware Config
Extracted
lokibot
http://sempersim.su/gk18/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Swift Copy.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Swift Copy.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Swift Copy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 444 set thread context of 1644 444 Swift Copy.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 Swift Copy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 Swift Copy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 PID 444 wrote to memory of 1644 444 Swift Copy.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Swift Copy.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Swift Copy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1644
-