Analysis
-
max time kernel
159s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
swiftcopy.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
swiftcopy.exe
Resource
win10v2004-20221111-en
General
-
Target
swiftcopy.exe
-
Size
390.0MB
-
MD5
f101b3158db2bdfbbeb97867f6b3dd91
-
SHA1
a726050dab999854ae32feffd9fe0e75796cec64
-
SHA256
900f05edc300fae13b416e42a9368acf5a3956895b7c7812d209b8c56bff08ea
-
SHA512
b1ae04125e3531a636fd7347cd22df2ca06d4d4ff42951c0b1d59923fe78034bcf5a7ec81fbbd891c454835202103ac751f617ec811eba07b9f39bb605a56779
-
SSDEEP
12288:PKBzbrJriwnMyQlh/b9bIhjv9qXvHvHXJKSV:P+75iwMrdbKhz0/Hv/
Malware Config
Extracted
remcos
worldclass
91.193.75.188:60005
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
worldclass.exe
-
copy_folder
worldclass
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-BY6BKA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
worldclass
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
worldclass.exeworldclass.exepid process 1008 worldclass.exe 1544 worldclass.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exeworldclass.exepid process 700 cmd.exe 1008 worldclass.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
swiftcopy.exeworldclass.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ swiftcopy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\worldclass = "\"C:\\Users\\Admin\\AppData\\Roaming\\worldclass\\worldclass.exe\"" swiftcopy.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ worldclass.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\worldclass = "\"C:\\Users\\Admin\\AppData\\Roaming\\worldclass\\worldclass.exe\"" worldclass.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ worldclass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\worldclass = "\"C:\\Users\\Admin\\AppData\\Roaming\\worldclass\\worldclass.exe\"" worldclass.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ swiftcopy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\worldclass = "\"C:\\Users\\Admin\\AppData\\Roaming\\worldclass\\worldclass.exe\"" swiftcopy.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
swiftcopy.exeworldclass.exedescription pid process target process PID 628 set thread context of 556 628 swiftcopy.exe swiftcopy.exe PID 1008 set thread context of 1544 1008 worldclass.exe worldclass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
worldclass.exepid process 1544 worldclass.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
swiftcopy.exeswiftcopy.exeWScript.execmd.exeworldclass.exedescription pid process target process PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 628 wrote to memory of 556 628 swiftcopy.exe swiftcopy.exe PID 556 wrote to memory of 848 556 swiftcopy.exe WScript.exe PID 556 wrote to memory of 848 556 swiftcopy.exe WScript.exe PID 556 wrote to memory of 848 556 swiftcopy.exe WScript.exe PID 556 wrote to memory of 848 556 swiftcopy.exe WScript.exe PID 848 wrote to memory of 700 848 WScript.exe cmd.exe PID 848 wrote to memory of 700 848 WScript.exe cmd.exe PID 848 wrote to memory of 700 848 WScript.exe cmd.exe PID 848 wrote to memory of 700 848 WScript.exe cmd.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 700 wrote to memory of 1008 700 cmd.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe PID 1008 wrote to memory of 1544 1008 worldclass.exe worldclass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\swiftcopy.exe"C:\Users\Admin\AppData\Local\Temp\swiftcopy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\swiftcopy.exe"C:\Users\Admin\AppData\Local\Temp\swiftcopy.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wegrrxk.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\worldclass\worldclass.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Roaming\worldclass\worldclass.exeC:\Users\Admin\AppData\Roaming\worldclass\worldclass.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\worldclass\worldclass.exe"C:\Users\Admin\AppData\Roaming\worldclass\worldclass.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434B
MD5a4a28eb230fc2e09b69530a935514936
SHA1094116e18776a84014e76cfe46e0b21de5245fbe
SHA2560e5fb1081178e158c0eeebc64c04edfd5692ced5fda83b963f7997c33c40e198
SHA512365e872a428c0bd15bece5bd1014beeb4618cce6ea572df1c9100ba8a6048ed5dfc6be5ec7999272082097830bf8703312f267dc2a92bc7e4d8b63a72e27cf5f
-
Filesize
332.8MB
MD50b073b6afc013d18a2a6bff6b030fdf9
SHA15d53d9f890aaadc28a73ee20a6d6ba81605a0c4b
SHA256785396ef6b187fc63c2672b43e85da670f09553f910a0ae6d368ab9cb79c83ec
SHA51231e758871de9e69066e5c498122040c23e420ce7adda223fad6c26aa401fb619e49cd974dbf353c0f014950f0495a30ae70d731403d2b88a16b18d679824b3cc
-
Filesize
319.9MB
MD537e8a0764c20fda33f27f3b2542f6a07
SHA16f41796eae22dda9b4f35c3d3256be35fbf8b2e8
SHA256a38642a41d99110ab332539cc19c9e17a6bdc8e94c8d85fa9abc3ee2088bc7aa
SHA512f333adf819903dc25f9369400b1d06b3a63395934f136e9ef1e8fa8601917737f0e95a5db1fc721dae734cad9c34887aa4c92907fd9661cbb2afbe7b2f6b3d55
-
Filesize
313.4MB
MD5cd95e1060973f0896bfe0803269552ce
SHA11a12f34a15bd559ce180a01646ca2f61148e4822
SHA256d0ed5e3df159b631fa3c65f986ef6a12285523a3c1dbd22acc513a372691ab22
SHA512766d19c41f5c304d1293bd573587d876ea12adc840ff64d8b69c55fc1e9682bcf0773c82123e073d89527517817f447c6e65c6d755785a3f623e4ffdffce7a7c
-
Filesize
325.1MB
MD5c40ecc0c7e8013816547f9cfd7b703a8
SHA10fa4d5bd2d504f087908feba865d53c37deb548a
SHA25689a7de689901dff37e087e79144a8113429e7458e728b670da8883bed53dbde0
SHA512f1b46e807d9d99099dd28bad729a57d6e978f0ccf841549f2745c31454020b616d5c1bb0caf4308f9f7decdd4ee4a584fbfcf86bbc80d9634778c9be066e4615
-
Filesize
335.2MB
MD5c3e838535184d101d6a4beff04c5caa6
SHA18563d8ef5b92b31e99d6e158836876a760f3119b
SHA2563c7fcd6c2cae26dec0a0f206d86e78ba45274d19e403c320dc8b44675f134f90
SHA512bd5f8eaa263f5dde73b55abcd9935c0df10ab2d803f4abde49e2aa329131769a5c8353105d12f7ca28de10613c0b38c2225570e42ce6844fe9e5f35225b44d13