Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 07:29
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.PDF.js
Resource
win7-20230831-en
General
-
Target
swift copy.PDF.js
-
Size
453KB
-
MD5
811a102d237ae380b2d9517fa79f2c6d
-
SHA1
17ff05d6c71c7c3f27be24cfd46b9653de9f67f2
-
SHA256
47ac55851c62e30f0553a5d32f2b6a128f532b9904fbf5e100b53895ec8a86ca
-
SHA512
3fcd5e98e5dbe0fb529ca77592bc012bc8560173114dfa754d363fe621b9336485a74fa48bd8bca4f676bfc91c2dc8ad5bc69c9a3b275b02722ec4e932688680
-
SSDEEP
6144:N5gPKUmu6hIe4UhL60X4dOvNJ38QJfJiDzh8qQESvpWvnR4Rt1Prz2fLFh2WR:N56fmu6mUhZVJ1J8DnRvAtlf2
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
flow pid Process 5 2712 wscript.exe 6 2712 wscript.exe 7 2712 wscript.exe 9 2712 wscript.exe 10 2712 wscript.exe 11 2712 wscript.exe 15 2712 wscript.exe 19 2712 wscript.exe 22 2712 wscript.exe 28 2712 wscript.exe 33 2712 wscript.exe 38 2712 wscript.exe 41 2712 wscript.exe 47 2712 wscript.exe 52 2712 wscript.exe 57 2712 wscript.exe 61 2712 wscript.exe 66 2712 wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ECqEVMhpHV.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ECqEVMhpHV.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 bin.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 ktmutil.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2784 set thread context of 1192 2784 bin.exe 14 PID 2784 set thread context of 1120 2784 bin.exe 35 PID 1120 set thread context of 1192 1120 ktmutil.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3185155662-718608226-894467740-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ktmutil.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2784 bin.exe 2784 bin.exe 2784 bin.exe 2784 bin.exe 2784 bin.exe 2784 bin.exe 2784 bin.exe 2784 bin.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2784 bin.exe 1192 Explorer.EXE 1192 Explorer.EXE 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe 1120 ktmutil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2712 2964 wscript.exe 28 PID 2964 wrote to memory of 2712 2964 wscript.exe 28 PID 2964 wrote to memory of 2712 2964 wscript.exe 28 PID 2964 wrote to memory of 2784 2964 wscript.exe 29 PID 2964 wrote to memory of 2784 2964 wscript.exe 29 PID 2964 wrote to memory of 2784 2964 wscript.exe 29 PID 2964 wrote to memory of 2784 2964 wscript.exe 29 PID 1192 wrote to memory of 1120 1192 Explorer.EXE 35 PID 1192 wrote to memory of 1120 1192 Explorer.EXE 35 PID 1192 wrote to memory of 1120 1192 Explorer.EXE 35 PID 1192 wrote to memory of 1120 1192 Explorer.EXE 35 PID 1120 wrote to memory of 2428 1120 ktmutil.exe 37 PID 1120 wrote to memory of 2428 1120 ktmutil.exe 37 PID 1120 wrote to memory of 2428 1120 ktmutil.exe 37 PID 1120 wrote to memory of 2428 1120 ktmutil.exe 37 PID 1120 wrote to memory of 2428 1120 ktmutil.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\swift copy.PDF.js"2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\ECqEVMhpHV.js"3⤵
- Blocklisted process makes network request
- Drops startup file
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\bin.exe"C:\Users\Admin\AppData\Roaming\bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2784
-
-
-
C:\Windows\SysWOW64\ktmutil.exe"C:\Windows\SysWOW64\ktmutil.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
498KB
MD58517bf92c0fd6228875ba74b2526b3b4
SHA17aa157feed160f7e207ce961aaee21e3075b3ab9
SHA256536ad85a299f5f7afc36f5944ea55d9f32495491265bf1305a41b3667176998d
SHA512929c686123eb405c258d3ece2466b69f641041c2e2b7a4c13c7efa58a6654b387ac1ee4f7c643e70c84b38eddf39eccc6f816420e731e899468c9ab0fb9a2732
-
Filesize
7KB
MD5d7f1bd09dc54cdb298d18b01c350daad
SHA114389215c04486782b191d7e717604d47b4855f5
SHA2561d15ca695084184b5e58a8ea3776bb5c8d2972c1d22d8ba0ded53b00bae8807b
SHA5124fc09bf5626f1ce47a6b66b64bf9c3f22545ce481161f9b2c5e9fdc302d4d5b3e7acfd549bb24ec1405e4d93b3727abd301d957f32d44ed8d6d5cb3af7f8d976
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
244KB
MD5191c89bfc7613125182be0c6f7dc0828
SHA11f856de98621182f9885f5ceb5017806a48a19f6
SHA2560b5a9848fa4433d737febc05dafaa4f8db69d2605c8014a616fac6c4abc69c53
SHA512a1d22bfe1716682d00ae6dce97d2da37c33fcfc40a10da745f23abd837042e0016e651cabd9e12979dd2a0eb055c7f41c0d7ad8bafefb07e8203d3d4ef1f6550
-
Filesize
949KB
MD538a3e021eb32c9976adaf0b3372080fc
SHA168e02803c646be21007d90bec841c176b82211fd
SHA2568cde0275d60da0d11954f73c7c8862cfc4b306f61bb8b1ce14abe4a193af2652
SHA512b886cc112f2750e7300b66f7242850659fa49fdc97f75aed376cb9f5440875f303a143bf8b51068ec42674f1ebe1dfcc40534f3a7aed3cc4d20f9274b9a66d18