Analysis
-
max time kernel
137s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:57
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT REF.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SWIFT REF.exe
Resource
win10v2004-20220901-en
General
-
Target
SWIFT REF.exe
-
Size
1.1MB
-
MD5
cb9bc8e2f918725b9d28925aa42cba1e
-
SHA1
fedbd5f39e13a4dffe8b4d1e36d3c50bdf9f433b
-
SHA256
f3a184f74b8326b79d5f99aa2a412b18fa50f89b55017f852b4e74713342eae2
-
SHA512
8dea90cc898a04cb50b0760281e160838e35fc9ca22734ea66f0b2308bdecea6891eb278b47c6bbf3a35f0896ae86dfcb6467a3247f48afe3d9fb828275479bd
-
SSDEEP
24576:REAojIr4A11gcBQqcsrF6NCg0fJACQU4I6bB589j:KAoMr4A115S5u6NT0fJAC14I6bQ
Malware Config
Signatures
-
Detect Neshta payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-91-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-92-0x00000000004080E4-mapping.dmp family_neshta behavioral1/memory/1812-93-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-97-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" MSBuild.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Loads dropped DLL 2 IoCs
Processes:
MSBuild.exepid process 1812 MSBuild.exe 1812 MSBuild.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SWIFT REF.exeMSBuild.exedescription pid process target process PID 2016 set thread context of 1520 2016 SWIFT REF.exe MSBuild.exe PID 1520 set thread context of 1812 1520 MSBuild.exe MSBuild.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe MSBuild.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe MSBuild.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe MSBuild.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\Windows\svchost.com MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
SWIFT REF.exepowershell.exepid process 2016 SWIFT REF.exe 2016 SWIFT REF.exe 1700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SWIFT REF.exepowershell.exedescription pid process Token: SeDebugPrivilege 2016 SWIFT REF.exe Token: SeDebugPrivilege 1700 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
SWIFT REF.exeMSBuild.exedescription pid process target process PID 2016 wrote to memory of 1700 2016 SWIFT REF.exe powershell.exe PID 2016 wrote to memory of 1700 2016 SWIFT REF.exe powershell.exe PID 2016 wrote to memory of 1700 2016 SWIFT REF.exe powershell.exe PID 2016 wrote to memory of 1700 2016 SWIFT REF.exe powershell.exe PID 2016 wrote to memory of 1728 2016 SWIFT REF.exe schtasks.exe PID 2016 wrote to memory of 1728 2016 SWIFT REF.exe schtasks.exe PID 2016 wrote to memory of 1728 2016 SWIFT REF.exe schtasks.exe PID 2016 wrote to memory of 1728 2016 SWIFT REF.exe schtasks.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 2016 wrote to memory of 1520 2016 SWIFT REF.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe PID 1520 wrote to memory of 1812 1520 MSBuild.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT REF.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT REF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\urrHTfW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\urrHTfW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD94.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDD94.tmpFilesize
1KB
MD503daad9d239327db0dcebdb7051174cd
SHA1c78e7b3bb0963001d12642a1529d4bc0e6323d64
SHA2568b3f83b6001f014cad603687c20187c2e31aab8b6a64c70a43739b8a5ce9b09e
SHA51220ee2658d277a18367fb5e575fe928b482daaa7bac13a8bf3b289e3d74d1c74486039ca95271360852ebcb3751748eaf9d41e79a487afa6291734ce62fc1bf4d
-
C:\Users\Admin\AppData\Roaming\urrHTfW.exeFilesize
1.1MB
MD5cb9bc8e2f918725b9d28925aa42cba1e
SHA1fedbd5f39e13a4dffe8b4d1e36d3c50bdf9f433b
SHA256f3a184f74b8326b79d5f99aa2a412b18fa50f89b55017f852b4e74713342eae2
SHA5128dea90cc898a04cb50b0760281e160838e35fc9ca22734ea66f0b2308bdecea6891eb278b47c6bbf3a35f0896ae86dfcb6467a3247f48afe3d9fb828275479bd
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEFilesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Roaming\urrHTfW.exeFilesize
1.1MB
MD5cb9bc8e2f918725b9d28925aa42cba1e
SHA1fedbd5f39e13a4dffe8b4d1e36d3c50bdf9f433b
SHA256f3a184f74b8326b79d5f99aa2a412b18fa50f89b55017f852b4e74713342eae2
SHA5128dea90cc898a04cb50b0760281e160838e35fc9ca22734ea66f0b2308bdecea6891eb278b47c6bbf3a35f0896ae86dfcb6467a3247f48afe3d9fb828275479bd
-
memory/1520-79-0x00000000003E0000-0x00000000003EC000-memory.dmpFilesize
48KB
-
memory/1520-69-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-95-0x0000000004CE5000-0x0000000004CF6000-memory.dmpFilesize
68KB
-
memory/1520-80-0x00000000060A0000-0x0000000006120000-memory.dmpFilesize
512KB
-
memory/1520-81-0x0000000000C80000-0x0000000000CC8000-memory.dmpFilesize
288KB
-
memory/1520-64-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-65-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-67-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-68-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-77-0x00000000004D0000-0x00000000004E8000-memory.dmpFilesize
96KB
-
memory/1520-70-0x00000000004BE6FA-mapping.dmp
-
memory/1520-72-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1520-74-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/1700-76-0x000000006E6D0000-0x000000006EC7B000-memory.dmpFilesize
5.7MB
-
memory/1700-59-0x0000000000000000-mapping.dmp
-
memory/1700-78-0x000000006E6D0000-0x000000006EC7B000-memory.dmpFilesize
5.7MB
-
memory/1728-60-0x0000000000000000-mapping.dmp
-
memory/1812-83-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-82-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-87-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-89-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-88-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-91-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-86-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-85-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-101-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-97-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-92-0x00000000004080E4-mapping.dmp
-
memory/1812-93-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1812-96-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2016-54-0x0000000000900000-0x0000000000A12000-memory.dmpFilesize
1.1MB
-
memory/2016-58-0x00000000058C0000-0x00000000059B4000-memory.dmpFilesize
976KB
-
memory/2016-57-0x0000000000510000-0x000000000051E000-memory.dmpFilesize
56KB
-
memory/2016-56-0x0000000000220000-0x0000000000236000-memory.dmpFilesize
88KB
-
memory/2016-55-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/2016-63-0x0000000007FD0000-0x0000000008094000-memory.dmpFilesize
784KB