Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy.exe
Resource
win7-20240508-en
General
-
Target
Swift Copy.exe
-
Size
49KB
-
MD5
fadef7ce43e9627a752d03a41e71ee41
-
SHA1
f8a9907fdb73ca4b162b20a79d9384ab5277af31
-
SHA256
80762425adc5f24b5c7be359dd4cb7c1c657bb21f0304dcb89eb6bd6d8d8e0da
-
SHA512
764ddce479431043510647f95fb376be3b62bc7e6283173c9d7849130335a8daa2aad2b86e8a7693cd5c92c1b94e809cf1a0ec1ecbb2fb6c196d1764a0a9a081
-
SSDEEP
768:P1YSqVwQ8rD6pSg12mkQu3MyoELiym7/FDFTNxIrgBjv5VQ6:PyeQkDxtcyJm7tk0jv5VJ
Malware Config
Extracted
formbook
4.1
sr62
pizzaperol.com
brooklynlearningstudio.com
legendlearningacghy.net
xtlg3i19o7czkv4.buzz
outdoorsproducts.xyz
nissanthanhhoa.com
mtviewproservices.com
tichris.com
monopolygo.llc
engagemaxmail.com
supremeinsure.com
2018b7.com
tedxkarunyauniversity.com
vaishnaviyoga.in
goddessoffetish.com
dazewu.com
844385.autos
caluxio.com
restaurantlataberna.com
charlieahunter.com
odvip587.com
anashamilton.com
jeep119.com
writebetter.io
npg.world
ashlynbellamy.com
matrixmech.com
spotaac.com
salazar-womens-apparel.com
soothe.fm
odty819.net
mega278.com
constructionsbretonetfils.com
labherbajar.com
fndegkgnqweitltjkoos.com
cb284.cc
salesbiome.bio
catpixel.art
vitalsdentalclinic.com
roofing-services-19534.bond
mojomanna.com
singhaseni.net
dolby-atmos-mixing.net
frontandboundary.co
silvercreeksocial.com
campinggoals.com
assalambahji.com
jtcloud.xyz
diancaigui.info
dongless.com
imnaheal.online
serviciosferiales.online
sagitar.cc
renxren.com
honeybeedentalhygiene.com
plcu5c.vip
edoybphu.shop
momvlogs.com
globaltd4613.xyz
internet-providers-58517.bond
emanews.info
harrisonm-fitness.com
yufde.xyz
thecarocellmusic.com
vhimvd-shop.club
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2988-4894-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2988-4898-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2988-4902-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2640 set thread context of 2988 2640 Swift Copy.exe 97 PID 2988 set thread context of 3424 2988 Swift Copy.exe 56 PID 2988 set thread context of 3424 2988 Swift Copy.exe 56 PID 4140 set thread context of 3424 4140 raserver.exe 56 -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe 4140 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 2988 Swift Copy.exe 4140 raserver.exe 4140 raserver.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2640 Swift Copy.exe Token: SeDebugPrivilege 2640 Swift Copy.exe Token: SeDebugPrivilege 2988 Swift Copy.exe Token: SeDebugPrivilege 4140 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3424 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 2640 wrote to memory of 2988 2640 Swift Copy.exe 97 PID 3424 wrote to memory of 4140 3424 Explorer.EXE 99 PID 3424 wrote to memory of 4140 3424 Explorer.EXE 99 PID 3424 wrote to memory of 4140 3424 Explorer.EXE 99 PID 4140 wrote to memory of 4568 4140 raserver.exe 100 PID 4140 wrote to memory of 4568 4140 raserver.exe 100 PID 4140 wrote to memory of 4568 4140 raserver.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"3⤵PID:4568
-
-