Analysis
-
max time kernel
84s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
Payment swiftSOA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment swiftSOA.exe
Resource
win10v2004-20220901-en
General
-
Target
Payment swiftSOA.exe
-
Size
1.1MB
-
MD5
fbd05e26adad928bdd8cfde31cd1ef62
-
SHA1
359f4f64d05ea7f9f039d392da7d4a58831367d0
-
SHA256
e48102120cffcac97206067caee589ca90608b2a2f5ad44b71ab121bfbd05d17
-
SHA512
6badff7f04fa429ae0a9dd2ef93b99b6dd58d553561651dbc0c6c5b974000996fd24645cb92295a04ae62582e6cf1221b96f17c548c63a981210fd6be7c1bcd2
-
SSDEEP
24576:dDghp92/x/X/80zmYAxAhZcA9iisXS/bDwJef:B0M/1JmYAWY6CSPw
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Payment swiftSOA.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment swiftSOA.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment swiftSOA.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment swiftSOA.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3628 set thread context of 2260 3628 Payment swiftSOA.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3628 Payment swiftSOA.exe 3628 Payment swiftSOA.exe 3120 powershell.exe 2260 Payment swiftSOA.exe 2260 Payment swiftSOA.exe 3120 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3628 Payment swiftSOA.exe Token: SeDebugPrivilege 3120 powershell.exe Token: SeDebugPrivilege 2260 Payment swiftSOA.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3628 Payment swiftSOA.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3628 Payment swiftSOA.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3120 3628 Payment swiftSOA.exe 91 PID 3628 wrote to memory of 3120 3628 Payment swiftSOA.exe 91 PID 3628 wrote to memory of 3120 3628 Payment swiftSOA.exe 91 PID 3628 wrote to memory of 2456 3628 Payment swiftSOA.exe 93 PID 3628 wrote to memory of 2456 3628 Payment swiftSOA.exe 93 PID 3628 wrote to memory of 2456 3628 Payment swiftSOA.exe 93 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 PID 3628 wrote to memory of 2260 3628 Payment swiftSOA.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment swiftSOA.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment swiftSOA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment swiftSOA.exe"C:\Users\Admin\AppData\Local\Temp\Payment swiftSOA.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FqsQmdNUk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FqsQmdNUk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC999.tmp"2⤵
- Creates scheduled task(s)
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\Payment swiftSOA.exe"C:\Users\Admin\AppData\Local\Temp\Payment swiftSOA.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
Filesize
1KB
MD53cfd4f5726cc8da4bb39ad686022a2e2
SHA12574066c1046b6609a5ace6e2fbc688cd7c39b5d
SHA256a58cafccb1c61a9164c01c47a1065c7c32a6af81a825c9a1f0722f190c23db0b
SHA512fdf22aa397eabd3b2516f1815f0eb4b98951336a6a1ddfc28c6f0efb72e685a86e66bed1b400db3f57c9a93639ac7cfc0477a4a8b5be16a52d1dde2a1488ee8b