Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 07:16
Behavioral task
behavioral1
Sample
USD46k Swift_PDF.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
USD46k Swift_PDF.exe
Resource
win10v2004-20240508-en
General
-
Target
USD46k Swift_PDF.exe
-
Size
659KB
-
MD5
b2c97bdc5cdba659fcc2da66d2f80a8f
-
SHA1
812541b4d56efd804b47fdae1630b69433419320
-
SHA256
256194e31f5e3cdd00144320e30165ec54d77de265f5d959b22993b4ce124863
-
SHA512
013abfed445d1d1868a65a9e632759d3c600c3c334cb001f6dd527557667e1bd3e95b07d4d650c8bb83cf5ebe9f8962c9a8be0b53562c880299f0fa7776f865d
-
SSDEEP
12288:AYV6MorX7qzuC3QHO9FQVHPF51jgc1tcpHY+etwlcjM3c0Ib9:fBXu9HGaVHotetwlcuKb9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2064-0-0x0000000000730000-0x00000000008A7000-memory.dmp upx behavioral2/memory/2064-17-0x0000000000730000-0x00000000008A7000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2064-17-0x0000000000730000-0x00000000008A7000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2064 set thread context of 1892 2064 USD46k Swift_PDF.exe 86 PID 1892 set thread context of 3420 1892 svchost.exe 56 PID 1892 set thread context of 4848 1892 svchost.exe 101 PID 4848 set thread context of 3420 4848 setupugc.exe 56 PID 4848 set thread context of 3036 4848 setupugc.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 5084 2064 WerFault.exe 82 -
description ioc Process Key created \Registry\User\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 setupugc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 1892 svchost.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 2064 USD46k Swift_PDF.exe 1892 svchost.exe 1892 svchost.exe 3420 Explorer.EXE 3420 Explorer.EXE 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe 4848 setupugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2064 USD46k Swift_PDF.exe 2064 USD46k Swift_PDF.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2064 USD46k Swift_PDF.exe 2064 USD46k Swift_PDF.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1892 2064 USD46k Swift_PDF.exe 86 PID 2064 wrote to memory of 1892 2064 USD46k Swift_PDF.exe 86 PID 2064 wrote to memory of 1892 2064 USD46k Swift_PDF.exe 86 PID 2064 wrote to memory of 1892 2064 USD46k Swift_PDF.exe 86 PID 3420 wrote to memory of 4848 3420 Explorer.EXE 101 PID 3420 wrote to memory of 4848 3420 Explorer.EXE 101 PID 3420 wrote to memory of 4848 3420 Explorer.EXE 101 PID 4848 wrote to memory of 3036 4848 setupugc.exe 103 PID 4848 wrote to memory of 3036 4848 setupugc.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 7083⤵
- Program crash
PID:5084
-
-
-
C:\Windows\SysWOW64\setupugc.exe"C:\Windows\SysWOW64\setupugc.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 20641⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD57f90b70897582470c201796b1f5efa19
SHA1b6619c8dfbc51aba1876eef95def633ac87993c4
SHA2563978af8e0beb0c0a221219a4633d97a06b00726f8b1d8e9405f3c42e4a01d9c8
SHA51209ff14207e239ebddf130292bf6d7fef453e969cf2bf1d2a3ae670e5ebf6e350562a505ee63d4c1bb2c8def34601f1b3dcd5b88f8cf6abdfddab364071b73748