Analysis

  • max time kernel
    106s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 03:08

General

  • Target

    Swift_202411054785712.exe

  • Size

    1.1MB

  • MD5

    aaf2dc8cddf0d1d520a115465d982e85

  • SHA1

    265889f5bbe27be46303371e1debea373582bb72

  • SHA256

    d948ec899810d776263d97504c42d9918b2333b97883599877a5d3c214e863a7

  • SHA512

    5c7ab16ddb87eadac527d7c9071eba96f8238f11b79218b612bfb4fa8a5210407c712099e9be475c27cd9deac053b3d7e75f4e556817016d3453f85b084ff472

  • SSDEEP

    24576:jAHnh+eWsN3skA4RV1Hom2KXMmHakGXGhMHb0/3Yjh5:uh+ZkldoPK8YakM7IYX

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 33 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift_202411054785712.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift_202411054785712.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\Swift_202411054785712.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 712
      2⤵
      • Program crash
      PID:692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4896 -ip 4896
    1⤵
      PID:3612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1244-11-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1244-12-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1244-14-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1244-13-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1244-15-0x000000007427E000-0x000000007427F000-memory.dmp

      Filesize

      4KB

    • memory/1244-16-0x0000000005680000-0x00000000056D4000-memory.dmp

      Filesize

      336KB

    • memory/1244-17-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-18-0x0000000005E10000-0x00000000063B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1244-19-0x0000000005710000-0x0000000005762000-memory.dmp

      Filesize

      328KB

    • memory/1244-20-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-21-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-35-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-71-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-81-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-79-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-77-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-75-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-73-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-69-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-65-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-63-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-61-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-59-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-57-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-55-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-53-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-51-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-49-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-47-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-67-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-45-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-43-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-41-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-39-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-37-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-33-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-31-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-29-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-27-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-25-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-23-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-22-0x0000000005710000-0x000000000575D000-memory.dmp

      Filesize

      308KB

    • memory/1244-1052-0x0000000005960000-0x00000000059C6000-memory.dmp

      Filesize

      408KB

    • memory/1244-1053-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-1054-0x0000000006D90000-0x0000000006DE0000-memory.dmp

      Filesize

      320KB

    • memory/1244-1055-0x0000000006E80000-0x0000000006F12000-memory.dmp

      Filesize

      584KB

    • memory/1244-1056-0x0000000006E00000-0x0000000006E0A000-memory.dmp

      Filesize

      40KB

    • memory/1244-1057-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/1244-1058-0x000000007427E000-0x000000007427F000-memory.dmp

      Filesize

      4KB

    • memory/1244-1059-0x0000000074270000-0x0000000074A20000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-10-0x0000000001840000-0x0000000001844000-memory.dmp

      Filesize

      16KB