Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 17:57
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT REF.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SWIFT REF.exe
Resource
win10v2004-20220901-en
General
-
Target
SWIFT REF.exe
-
Size
1.1MB
-
MD5
cb9bc8e2f918725b9d28925aa42cba1e
-
SHA1
fedbd5f39e13a4dffe8b4d1e36d3c50bdf9f433b
-
SHA256
f3a184f74b8326b79d5f99aa2a412b18fa50f89b55017f852b4e74713342eae2
-
SHA512
8dea90cc898a04cb50b0760281e160838e35fc9ca22734ea66f0b2308bdecea6891eb278b47c6bbf3a35f0896ae86dfcb6467a3247f48afe3d9fb828275479bd
-
SSDEEP
24576:REAojIr4A11gcBQqcsrF6NCg0fJACQU4I6bB589j:KAoMr4A115S5u6NT0fJAC14I6bQ
Malware Config
Signatures
-
Detect Neshta payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4504-161-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4504-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4504-163-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4504-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4504-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" MSBuild.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SWIFT REF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation SWIFT REF.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SWIFT REF.exeMSBuild.exedescription pid process target process PID 1972 set thread context of 4176 1972 SWIFT REF.exe MSBuild.exe PID 4176 set thread context of 4504 4176 MSBuild.exe MSBuild.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI9C33~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe MSBuild.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~3.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MIA062~1.EXE MSBuild.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~2.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe MSBuild.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE MSBuild.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~4.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~1.EXE MSBuild.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe MSBuild.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe MSBuild.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE MSBuild.exe -
Drops file in Windows directory 1 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\Windows\svchost.com MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SWIFT REF.exepowershell.exeMSBuild.exepid process 1972 SWIFT REF.exe 1972 SWIFT REF.exe 1016 powershell.exe 1016 powershell.exe 4176 MSBuild.exe 4176 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SWIFT REF.exepowershell.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1972 SWIFT REF.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 4176 MSBuild.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
SWIFT REF.exeMSBuild.exedescription pid process target process PID 1972 wrote to memory of 1016 1972 SWIFT REF.exe powershell.exe PID 1972 wrote to memory of 1016 1972 SWIFT REF.exe powershell.exe PID 1972 wrote to memory of 1016 1972 SWIFT REF.exe powershell.exe PID 1972 wrote to memory of 4476 1972 SWIFT REF.exe schtasks.exe PID 1972 wrote to memory of 4476 1972 SWIFT REF.exe schtasks.exe PID 1972 wrote to memory of 4476 1972 SWIFT REF.exe schtasks.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 1972 wrote to memory of 4176 1972 SWIFT REF.exe MSBuild.exe PID 4176 wrote to memory of 3844 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 3844 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 3844 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe PID 4176 wrote to memory of 4504 4176 MSBuild.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT REF.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT REF.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\urrHTfW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\urrHTfW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9097.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9097.tmpFilesize
1KB
MD58503c2a700ed9c0ec17ea36cfbbc783f
SHA1e9da4a55e5c723f7c6551efed2fb9d43e7113886
SHA2561c227cfb909819d3486d50fcdd560083a7261efd0aad54a19ce5cc24e7b5b047
SHA5121b60883c8729b147ef5d436bf61f2560d1936ae5266a663696a81265532664f046a66f57739f468a8f7ad3eb06c90fd0c8ac1884ebd69326a16d2a9b846b7e11
-
C:\Users\Admin\AppData\Roaming\urrHTfW.exeFilesize
1.1MB
MD5cb9bc8e2f918725b9d28925aa42cba1e
SHA1fedbd5f39e13a4dffe8b4d1e36d3c50bdf9f433b
SHA256f3a184f74b8326b79d5f99aa2a412b18fa50f89b55017f852b4e74713342eae2
SHA5128dea90cc898a04cb50b0760281e160838e35fc9ca22734ea66f0b2308bdecea6891eb278b47c6bbf3a35f0896ae86dfcb6467a3247f48afe3d9fb828275479bd
-
memory/1016-148-0x0000000006710000-0x000000000672E000-memory.dmpFilesize
120KB
-
memory/1016-143-0x00000000058A0000-0x0000000005EC8000-memory.dmpFilesize
6.2MB
-
memory/1016-158-0x0000000007D30000-0x0000000007D38000-memory.dmpFilesize
32KB
-
memory/1016-150-0x0000000070AC0000-0x0000000070B0C000-memory.dmpFilesize
304KB
-
memory/1016-138-0x0000000000000000-mapping.dmp
-
memory/1016-157-0x0000000007D50000-0x0000000007D6A000-memory.dmpFilesize
104KB
-
memory/1016-140-0x0000000002E00000-0x0000000002E36000-memory.dmpFilesize
216KB
-
memory/1016-151-0x0000000006C90000-0x0000000006CAE000-memory.dmpFilesize
120KB
-
memory/1016-156-0x0000000007C40000-0x0000000007C4E000-memory.dmpFilesize
56KB
-
memory/1016-147-0x0000000006120000-0x0000000006186000-memory.dmpFilesize
408KB
-
memory/1016-155-0x0000000007C90000-0x0000000007D26000-memory.dmpFilesize
600KB
-
memory/1016-145-0x0000000005730000-0x0000000005752000-memory.dmpFilesize
136KB
-
memory/1016-146-0x0000000006040000-0x00000000060A6000-memory.dmpFilesize
408KB
-
memory/1016-152-0x0000000008060000-0x00000000086DA000-memory.dmpFilesize
6.5MB
-
memory/1016-154-0x0000000007A80000-0x0000000007A8A000-memory.dmpFilesize
40KB
-
memory/1016-149-0x0000000006CF0000-0x0000000006D22000-memory.dmpFilesize
200KB
-
memory/1016-153-0x0000000007A10000-0x0000000007A2A000-memory.dmpFilesize
104KB
-
memory/1972-134-0x00000000051C0000-0x0000000005252000-memory.dmpFilesize
584KB
-
memory/1972-136-0x0000000005280000-0x000000000528A000-memory.dmpFilesize
40KB
-
memory/1972-137-0x0000000007FD0000-0x000000000806C000-memory.dmpFilesize
624KB
-
memory/1972-132-0x0000000000710000-0x0000000000822000-memory.dmpFilesize
1.1MB
-
memory/1972-135-0x0000000005570000-0x0000000005716000-memory.dmpFilesize
1.6MB
-
memory/1972-133-0x0000000005880000-0x0000000005E24000-memory.dmpFilesize
5.6MB
-
memory/3844-159-0x0000000000000000-mapping.dmp
-
memory/4176-144-0x0000000000400000-0x00000000004C4000-memory.dmpFilesize
784KB
-
memory/4176-142-0x0000000000000000-mapping.dmp
-
memory/4476-139-0x0000000000000000-mapping.dmp
-
memory/4504-160-0x0000000000000000-mapping.dmp
-
memory/4504-161-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4504-162-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4504-163-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4504-164-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4504-166-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB