Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 07:16

General

  • Target

    USD46k Swift_PDF.exe

  • Size

    659KB

  • MD5

    b2c97bdc5cdba659fcc2da66d2f80a8f

  • SHA1

    812541b4d56efd804b47fdae1630b69433419320

  • SHA256

    256194e31f5e3cdd00144320e30165ec54d77de265f5d959b22993b4ce124863

  • SHA512

    013abfed445d1d1868a65a9e632759d3c600c3c334cb001f6dd527557667e1bd3e95b07d4d650c8bb83cf5ebe9f8962c9a8be0b53562c880299f0fa7776f865d

  • SSDEEP

    12288:AYV6MorX7qzuC3QHO9FQVHPF51jgc1tcpHY+etwlcjM3c0Ib9:fBXu9HGaVHotetwlcuKb9

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2144
    • C:\Windows\SysWOW64\setupugc.exe
      "C:\Windows\SysWOW64\setupugc.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bezzo

          Filesize

          267KB

          MD5

          7f90b70897582470c201796b1f5efa19

          SHA1

          b6619c8dfbc51aba1876eef95def633ac87993c4

          SHA256

          3978af8e0beb0c0a221219a4633d97a06b00726f8b1d8e9405f3c42e4a01d9c8

          SHA512

          09ff14207e239ebddf130292bf6d7fef453e969cf2bf1d2a3ae670e5ebf6e350562a505ee63d4c1bb2c8def34601f1b3dcd5b88f8cf6abdfddab364071b73748

        • C:\Users\Admin\AppData\Local\Temp\cfb0e.zip

          Filesize

          400KB

          MD5

          a5da69af7949d4105687b2b562dee631

          SHA1

          dd3d90e088cfe84508db5fed9ec2e5a099acb85b

          SHA256

          4ce2414b233689a71ff93b56bbb79aecd48329d0ea3bf876e0bf679c19b8db13

          SHA512

          eca61b4f39c67944b6d98cae45770c7725d8a52e6210939fe46cff826275041751177005678c663f855b0cdb9dd049bf4b4a769e5f23023cf3753a695ff52c9f

        • \Users\Admin\AppData\Local\Temp\sqlite3.dll

          Filesize

          770KB

          MD5

          65f6090dfb069aca962a59f6df9e6113

          SHA1

          879bad504dfcce1a591c97817f3ff1e63931cfd2

          SHA256

          32a302d8c235226d8cdda4d957f151df3e5736fdce7886e6c794f0648b2eb106

          SHA512

          4c0e5e1103749356dceaaaa312e853bda83ec14f2f12288e9020cdf42b6e80d4caaec03d1ef7f34d81ddf2da88e6160c0c711380c2a7d89012e660406cdbb987

        • memory/1196-29-0x0000000004560000-0x000000000461C000-memory.dmp

          Filesize

          752KB

        • memory/1196-71-0x0000000004560000-0x000000000461C000-memory.dmp

          Filesize

          752KB

        • memory/1196-31-0x0000000009040000-0x00000000095EF000-memory.dmp

          Filesize

          5.7MB

        • memory/1196-30-0x0000000004560000-0x000000000461C000-memory.dmp

          Filesize

          752KB

        • memory/1196-21-0x0000000009040000-0x00000000095EF000-memory.dmp

          Filesize

          5.7MB

        • memory/1728-12-0x00000000001E0000-0x00000000001E4000-memory.dmp

          Filesize

          16KB

        • memory/1728-15-0x0000000000F60000-0x00000000010D7000-memory.dmp

          Filesize

          1.5MB

        • memory/1728-0-0x0000000000F60000-0x00000000010D7000-memory.dmp

          Filesize

          1.5MB

        • memory/2144-17-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2144-20-0x00000000001F0000-0x0000000000210000-memory.dmp

          Filesize

          128KB

        • memory/2144-25-0x00000000001F0000-0x0000000000210000-memory.dmp

          Filesize

          128KB

        • memory/2144-24-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2144-13-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2144-16-0x0000000000890000-0x0000000000B93000-memory.dmp

          Filesize

          3.0MB

        • memory/2144-18-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2144-19-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2800-26-0x0000000002210000-0x0000000002513000-memory.dmp

          Filesize

          3.0MB

        • memory/2800-22-0x0000000000090000-0x00000000000D0000-memory.dmp

          Filesize

          256KB

        • memory/2800-28-0x0000000000960000-0x00000000009FF000-memory.dmp

          Filesize

          636KB

        • memory/2800-27-0x0000000000090000-0x00000000000D0000-memory.dmp

          Filesize

          256KB

        • memory/2800-70-0x0000000000090000-0x00000000000D0000-memory.dmp

          Filesize

          256KB

        • memory/2800-69-0x0000000061C00000-0x0000000061CB2000-memory.dmp

          Filesize

          712KB

        • memory/2800-23-0x0000000000090000-0x00000000000D0000-memory.dmp

          Filesize

          256KB