Analysis

  • max time kernel
    123s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 02:16

General

  • Target

    3de75ebc0dc781b50ffcf059bb55bd01955d6d5e859985302f97f9cdecb3dceb.exe

  • Size

    6.2MB

  • MD5

    333136f93e800e920a79e6a1a1e3e1f4

  • SHA1

    dbe32a9110777bca904f5a4a71acb79595f25360

  • SHA256

    3de75ebc0dc781b50ffcf059bb55bd01955d6d5e859985302f97f9cdecb3dceb

  • SHA512

    fe889aedcb782f99f1f6618a5a1677aed150ff88a88c7f132d82a485b9c5866967024a646c2b042ed66d19068cc5a855c241ab730bcd443eca49ed97223331b0

  • SSDEEP

    98304:Xh3TZCHW46+ESLRLHtvmt00S3qQhB5YiMQHRNI4D3b9DolW1:Xh3tCB6+ESLlturQhBEiI4DL9Dom

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3de75ebc0dc781b50ffcf059bb55bd01955d6d5e859985302f97f9cdecb3dceb.exe
    "C:\Users\Admin\AppData\Local\Temp\3de75ebc0dc781b50ffcf059bb55bd01955d6d5e859985302f97f9cdecb3dceb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Roaming\Swift\handler.exe
      "C:\Users\Admin\AppData\Roaming\Swift\handler.exe"
      2⤵
      • Executes dropped EXE
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Swift\handler.exe

    Filesize

    355KB

    MD5

    84e6f64f899bfeb55fa64c5871de4ed7

    SHA1

    d8ce913a05d39cc086beaf43058b1ea4a9645430

    SHA256

    7416baa662c44701c5571d97967de41c33d06284d59f0a93bebc5684446436d5

    SHA512

    090255f81a5c7b4ef469664d41c9f4a66cdd8ed7d5bd8afc6a5fb8c7833ded18c47ff88fb59c3877fd29513f0d47ff6cbdfbd9cae84df91c1d756ee81bbca6f4

  • memory/2812-19-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2812-7-0x0000000000CA0000-0x0000000001847000-memory.dmp

    Filesize

    11.7MB

  • memory/2812-16-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2812-26-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2812-5-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2812-9-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2812-11-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2812-0-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2812-47-0x0000000000CA0000-0x0000000001847000-memory.dmp

    Filesize

    11.7MB

  • memory/2812-2-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/2812-6-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2812-24-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2812-14-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/2812-31-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2812-29-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2812-37-0x0000000000CA0000-0x0000000001847000-memory.dmp

    Filesize

    11.7MB

  • memory/2812-3-0x0000000000CA0000-0x0000000001847000-memory.dmp

    Filesize

    11.7MB

  • memory/2812-21-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB