Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
Transfer Swift Copy.exe
Resource
win7-20240215-en
General
-
Target
Transfer Swift Copy.exe
-
Size
528KB
-
MD5
0d5bfa60273cf3871c7596b7aa2fc447
-
SHA1
451461604085634e62758f142fbca0bdbf12a044
-
SHA256
e51b63aacca71c639c6f3b12a6b0eede821c54567125b52a21a0a24ec540d04a
-
SHA512
33afea5b2367b0f4a0f222d14d4fe531c8b076ff1c253897b4e69f9a2956637573284cb7433d75e09d6aeb6f1891a3b962672cd7be561f25e0649def528276a2
-
SSDEEP
12288:ZhQVh9a17gNm5YnXDdx2OjKhNHySntntjEyjIOm+mmmTIhfCGONcR9Ok:ZhQVh9FDdx2GKzSSt9ZSsmToik
Malware Config
Extracted
xloader
2.3
u8aa
quantexchanges.com
hizliarac.com
dropsdementanovohamburgo.com
tcinsurancegroup.net
byobvendors.com
arteasba.com
azrealtorsmastermind.com
voiceof5aabtv.com
zoom-bloopers.com
jxsenmei.com
interia-poczta.email
coolgiftbaskets.net
magetu.info
weedliberal.com
drsergiocastilloangiologo.com
starinsiderau.com
weightneutralmetflex.com
youxiandian.com
liberation.media
ferrari-news.com
holger3d.com
usisfirst1.com
n2yta.com
dreamsonfile.com
ctsquiroz.net
swastikbrass.com
decentfinance.net
fredricksburgcityschool.com
thetiffanyhiggins.com
emmadaniels.com
fiercebodystudios.com
ehealthkorea.com
molecular-nutritionist.com
leobomb.com
bellsecuritygroup.com
trueeclipse.com
aaviera.com
divebarmn.com
vipwellnessandnutrition.com
salepants.club
homthumb.com
suthabuilders.com
sskbrothers.com
vickysviews.com
100classicgames.com
mygadgetsolution.com
greenhawke.com
beehomeco.com
ishsy.com
morikomasuyo.art
nigeriawomenawards.com
xn--n7qp7x312b.com
cananyonehearme.com
list-logistik.com
ciicgroupinc.com
netyatra.com
exclusivecasinooffer.com
muyue7.com
organikfuzion-sd.com
kamilogy.com
pinnacleresilience.com
jstzjckj.com
rosannebelanger.com
coreburncycle.com
cryptodeposit.info
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3868-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3868-6-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1932-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1932-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Transfer Swift Copy.exeTransfer Swift Copy.execmmon32.exedescription pid Process procid_target PID 1004 set thread context of 3868 1004 Transfer Swift Copy.exe 85 PID 3868 set thread context of 3448 3868 Transfer Swift Copy.exe 57 PID 1932 set thread context of 3448 1932 cmmon32.exe 57 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Transfer Swift Copy.execmmon32.exepid Process 3868 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe 1932 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Transfer Swift Copy.exeTransfer Swift Copy.execmmon32.exepid Process 1004 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 3868 Transfer Swift Copy.exe 1932 cmmon32.exe 1932 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Transfer Swift Copy.execmmon32.exedescription pid Process Token: SeDebugPrivilege 3868 Transfer Swift Copy.exe Token: SeDebugPrivilege 1932 cmmon32.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3448 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Transfer Swift Copy.exeExplorer.EXEcmmon32.exedescription pid Process procid_target PID 1004 wrote to memory of 3868 1004 Transfer Swift Copy.exe 85 PID 1004 wrote to memory of 3868 1004 Transfer Swift Copy.exe 85 PID 1004 wrote to memory of 3868 1004 Transfer Swift Copy.exe 85 PID 1004 wrote to memory of 3868 1004 Transfer Swift Copy.exe 85 PID 3448 wrote to memory of 1932 3448 Explorer.EXE 86 PID 3448 wrote to memory of 1932 3448 Explorer.EXE 86 PID 3448 wrote to memory of 1932 3448 Explorer.EXE 86 PID 1932 wrote to memory of 4424 1932 cmmon32.exe 91 PID 1932 wrote to memory of 4424 1932 cmmon32.exe 91 PID 1932 wrote to memory of 4424 1932 cmmon32.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Transfer Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Transfer Swift Copy.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Transfer Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Transfer Swift Copy.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Transfer Swift Copy.exe"3⤵PID:4424
-
-