Analysis
-
max time kernel
54s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/03/2023, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
swift copy $68,000.00.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
swift copy $68,000.00.exe
Resource
win10v2004-20230221-en
General
-
Target
swift copy $68,000.00.exe
-
Size
1.0MB
-
MD5
2004b5ae5b6015b81978f7ea8ea8ec26
-
SHA1
9f0907cc595b01b069c832bc5ddc62f7f83bda32
-
SHA256
efd3884f2d85e8a19206eaf583a1f9c0187d36b18596710c323390815241d3f1
-
SHA512
f203b158f2aa1c0ff8853c8272a4aedecb1ccbc52217e4cf8d48096b650febe4e06d6f7bfb0c6274eb151bc91c88db5c4a825ee838b6cce3601871d849e0cded
-
SSDEEP
24576:nJ8ejSpQgBlxHwHRbTGBnEM7156Tjgg2Ty6nnjqKoe:oE0x8fgJXjqKoe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 2044 swift copy $68,000.00.exe 556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 swift copy $68,000.00.exe Token: SeDebugPrivilege 556 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2044 wrote to memory of 556 2044 swift copy $68,000.00.exe 28 PID 2044 wrote to memory of 556 2044 swift copy $68,000.00.exe 28 PID 2044 wrote to memory of 556 2044 swift copy $68,000.00.exe 28 PID 2044 wrote to memory of 556 2044 swift copy $68,000.00.exe 28 PID 2044 wrote to memory of 976 2044 swift copy $68,000.00.exe 30 PID 2044 wrote to memory of 976 2044 swift copy $68,000.00.exe 30 PID 2044 wrote to memory of 976 2044 swift copy $68,000.00.exe 30 PID 2044 wrote to memory of 976 2044 swift copy $68,000.00.exe 30 PID 2044 wrote to memory of 1652 2044 swift copy $68,000.00.exe 32 PID 2044 wrote to memory of 1652 2044 swift copy $68,000.00.exe 32 PID 2044 wrote to memory of 1652 2044 swift copy $68,000.00.exe 32 PID 2044 wrote to memory of 1652 2044 swift copy $68,000.00.exe 32 PID 2044 wrote to memory of 1804 2044 swift copy $68,000.00.exe 33 PID 2044 wrote to memory of 1804 2044 swift copy $68,000.00.exe 33 PID 2044 wrote to memory of 1804 2044 swift copy $68,000.00.exe 33 PID 2044 wrote to memory of 1804 2044 swift copy $68,000.00.exe 33 PID 2044 wrote to memory of 848 2044 swift copy $68,000.00.exe 34 PID 2044 wrote to memory of 848 2044 swift copy $68,000.00.exe 34 PID 2044 wrote to memory of 848 2044 swift copy $68,000.00.exe 34 PID 2044 wrote to memory of 848 2044 swift copy $68,000.00.exe 34 PID 2044 wrote to memory of 1184 2044 swift copy $68,000.00.exe 35 PID 2044 wrote to memory of 1184 2044 swift copy $68,000.00.exe 35 PID 2044 wrote to memory of 1184 2044 swift copy $68,000.00.exe 35 PID 2044 wrote to memory of 1184 2044 swift copy $68,000.00.exe 35 PID 2044 wrote to memory of 1596 2044 swift copy $68,000.00.exe 36 PID 2044 wrote to memory of 1596 2044 swift copy $68,000.00.exe 36 PID 2044 wrote to memory of 1596 2044 swift copy $68,000.00.exe 36 PID 2044 wrote to memory of 1596 2044 swift copy $68,000.00.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wGnnDT.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wGnnDT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD2AB.tmp"2⤵
- Creates scheduled task(s)
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"2⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"2⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"2⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"2⤵PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"C:\Users\Admin\AppData\Local\Temp\swift copy $68,000.00.exe"2⤵PID:1596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5183399d509a7eacfec347bd2215d276d
SHA11dad39949a89f01e416e67d51ecf71878c0ce347
SHA2560711fffd78d20c4beb8f137029790202292a6b952b14100c89f6a1874dad02a4
SHA5123b5e77933508697c122040cd2aaa84d16c42c6d4f7551ad69a9f63c4477bfe6680cbdcfbbaa9554ad32faeb39501b488cf9f2569421c50c401ec689bbe844de5