Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:16
Behavioral task
behavioral1
Sample
USD46k Swift_PDF.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
USD46k Swift_PDF.exe
Resource
win10v2004-20240508-en
General
-
Target
USD46k Swift_PDF.exe
-
Size
659KB
-
MD5
b2c97bdc5cdba659fcc2da66d2f80a8f
-
SHA1
812541b4d56efd804b47fdae1630b69433419320
-
SHA256
256194e31f5e3cdd00144320e30165ec54d77de265f5d959b22993b4ce124863
-
SHA512
013abfed445d1d1868a65a9e632759d3c600c3c334cb001f6dd527557667e1bd3e95b07d4d650c8bb83cf5ebe9f8962c9a8be0b53562c880299f0fa7776f865d
-
SSDEEP
12288:AYV6MorX7qzuC3QHO9FQVHPF51jgc1tcpHY+etwlcjM3c0Ib9:fBXu9HGaVHotetwlcuKb9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2800 setupugc.exe -
resource yara_rule behavioral1/memory/1728-0-0x0000000000F60000-0x00000000010D7000-memory.dmp upx behavioral1/memory/1728-15-0x0000000000F60000-0x00000000010D7000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1728-15-0x0000000000F60000-0x00000000010D7000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1728 set thread context of 2144 1728 USD46k Swift_PDF.exe 28 PID 2144 set thread context of 1196 2144 svchost.exe 21 PID 2144 set thread context of 2800 2144 svchost.exe 29 PID 2800 set thread context of 1196 2800 setupugc.exe 21 -
description ioc Process Key created \Registry\User\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 setupugc.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2800 setupugc.exe 2800 setupugc.exe 2800 setupugc.exe 2800 setupugc.exe 2800 setupugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1728 USD46k Swift_PDF.exe 2144 svchost.exe 1196 Explorer.EXE 1196 Explorer.EXE 2800 setupugc.exe 2800 setupugc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1728 USD46k Swift_PDF.exe 1728 USD46k Swift_PDF.exe 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1728 USD46k Swift_PDF.exe 1728 USD46k Swift_PDF.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2144 1728 USD46k Swift_PDF.exe 28 PID 1728 wrote to memory of 2144 1728 USD46k Swift_PDF.exe 28 PID 1728 wrote to memory of 2144 1728 USD46k Swift_PDF.exe 28 PID 1728 wrote to memory of 2144 1728 USD46k Swift_PDF.exe 28 PID 1728 wrote to memory of 2144 1728 USD46k Swift_PDF.exe 28 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2144
-
-
-
C:\Windows\SysWOW64\setupugc.exe"C:\Windows\SysWOW64\setupugc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD57f90b70897582470c201796b1f5efa19
SHA1b6619c8dfbc51aba1876eef95def633ac87993c4
SHA2563978af8e0beb0c0a221219a4633d97a06b00726f8b1d8e9405f3c42e4a01d9c8
SHA51209ff14207e239ebddf130292bf6d7fef453e969cf2bf1d2a3ae670e5ebf6e350562a505ee63d4c1bb2c8def34601f1b3dcd5b88f8cf6abdfddab364071b73748
-
Filesize
400KB
MD5a5da69af7949d4105687b2b562dee631
SHA1dd3d90e088cfe84508db5fed9ec2e5a099acb85b
SHA2564ce2414b233689a71ff93b56bbb79aecd48329d0ea3bf876e0bf679c19b8db13
SHA512eca61b4f39c67944b6d98cae45770c7725d8a52e6210939fe46cff826275041751177005678c663f855b0cdb9dd049bf4b4a769e5f23023cf3753a695ff52c9f
-
Filesize
770KB
MD565f6090dfb069aca962a59f6df9e6113
SHA1879bad504dfcce1a591c97817f3ff1e63931cfd2
SHA25632a302d8c235226d8cdda4d957f151df3e5736fdce7886e6c794f0648b2eb106
SHA5124c0e5e1103749356dceaaaa312e853bda83ec14f2f12288e9020cdf42b6e80d4caaec03d1ef7f34d81ddf2da88e6160c0c711380c2a7d89012e660406cdbb987