Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20240221-en
General
-
Target
Swift Copy.exe
-
Size
49KB
-
MD5
fadef7ce43e9627a752d03a41e71ee41
-
SHA1
f8a9907fdb73ca4b162b20a79d9384ab5277af31
-
SHA256
80762425adc5f24b5c7be359dd4cb7c1c657bb21f0304dcb89eb6bd6d8d8e0da
-
SHA512
764ddce479431043510647f95fb376be3b62bc7e6283173c9d7849130335a8daa2aad2b86e8a7693cd5c92c1b94e809cf1a0ec1ecbb2fb6c196d1764a0a9a081
-
SSDEEP
768:P1YSqVwQ8rD6pSg12mkQu3MyoELiym7/FDFTNxIrgBjv5VQ6:PyeQkDxtcyJm7tk0jv5VJ
Malware Config
Extracted
formbook
4.1
sr62
pizzaperol.com
brooklynlearningstudio.com
legendlearningacghy.net
xtlg3i19o7czkv4.buzz
outdoorsproducts.xyz
nissanthanhhoa.com
mtviewproservices.com
tichris.com
monopolygo.llc
engagemaxmail.com
supremeinsure.com
2018b7.com
tedxkarunyauniversity.com
vaishnaviyoga.in
goddessoffetish.com
dazewu.com
844385.autos
caluxio.com
restaurantlataberna.com
charlieahunter.com
odvip587.com
anashamilton.com
jeep119.com
writebetter.io
npg.world
ashlynbellamy.com
matrixmech.com
spotaac.com
salazar-womens-apparel.com
soothe.fm
odty819.net
mega278.com
constructionsbretonetfils.com
labherbajar.com
fndegkgnqweitltjkoos.com
cb284.cc
salesbiome.bio
catpixel.art
vitalsdentalclinic.com
roofing-services-19534.bond
mojomanna.com
singhaseni.net
dolby-atmos-mixing.net
frontandboundary.co
silvercreeksocial.com
campinggoals.com
assalambahji.com
jtcloud.xyz
diancaigui.info
dongless.com
imnaheal.online
serviciosferiales.online
sagitar.cc
renxren.com
honeybeedentalhygiene.com
plcu5c.vip
edoybphu.shop
momvlogs.com
globaltd4613.xyz
internet-providers-58517.bond
emanews.info
harrisonm-fitness.com
yufde.xyz
thecarocellmusic.com
vhimvd-shop.club
Signatures
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/3320-3-0x0000000008C00000-0x0000000008E3E000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-7-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-21-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-23-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-33-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-41-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-47-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-45-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-43-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-39-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-37-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-35-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-32-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-29-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-27-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-25-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-19-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-17-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-15-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-13-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-11-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-9-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-6-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-67-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-69-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-65-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-63-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-61-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-59-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-57-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-55-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-53-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-51-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 behavioral2/memory/3320-49-0x0000000008C00000-0x0000000008E38000-memory.dmp family_zgrat_v1 -
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2292-4895-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2292-4898-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Swift Copy.exeSwift Copy.execmd.exedescription pid process target process PID 3320 set thread context of 2292 3320 Swift Copy.exe Swift Copy.exe PID 2292 set thread context of 3376 2292 Swift Copy.exe Explorer.EXE PID 4516 set thread context of 3376 4516 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
Swift Copy.execmd.exepid process 2292 Swift Copy.exe 2292 Swift Copy.exe 2292 Swift Copy.exe 2292 Swift Copy.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe 4516 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Swift Copy.execmd.exepid process 2292 Swift Copy.exe 2292 Swift Copy.exe 2292 Swift Copy.exe 4516 cmd.exe 4516 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Swift Copy.exeSwift Copy.execmd.exedescription pid process Token: SeDebugPrivilege 3320 Swift Copy.exe Token: SeDebugPrivilege 3320 Swift Copy.exe Token: SeDebugPrivilege 2292 Swift Copy.exe Token: SeDebugPrivilege 4516 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3376 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Swift Copy.exeExplorer.EXEcmd.exedescription pid process target process PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3320 wrote to memory of 2292 3320 Swift Copy.exe Swift Copy.exe PID 3376 wrote to memory of 4516 3376 Explorer.EXE cmd.exe PID 3376 wrote to memory of 4516 3376 Explorer.EXE cmd.exe PID 3376 wrote to memory of 4516 3376 Explorer.EXE cmd.exe PID 4516 wrote to memory of 1484 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 1484 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 1484 4516 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"3⤵PID:1484
-
-