Overview
overview
7Static
static
3StashSwapper-main.zip
windows7-x64
1StashSwapper-main.zip
windows10-2004-x64
1StashSwapp...ibutes
windows7-x64
3StashSwapp...ibutes
windows10-2004-x64
3StashSwapp...me.txt
windows7-x64
1StashSwapp...me.txt
windows10-2004-x64
1StashSwapp...er.exe
windows7-x64
7StashSwapp...er.exe
windows10-2004-x64
7StashSwapper.pyc
windows7-x64
3StashSwapper.pyc
windows10-2004-x64
3StashSwapp...per.py
windows7-x64
3StashSwapp...per.py
windows10-2004-x64
3StashSwapp...r.spec
windows7-x64
3StashSwapp...r.spec
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:06
Behavioral task
behavioral1
Sample
StashSwapper-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
StashSwapper-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
StashSwapper-main/.gitattributes
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
StashSwapper-main/.gitattributes
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
StashSwapper-main/Readme.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
StashSwapper-main/Readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
StashSwapper-main/StashSwapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
StashSwapper-main/StashSwapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
StashSwapper.pyc
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
StashSwapper.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
StashSwapper-main/StashSwapper.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
StashSwapper-main/StashSwapper.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
StashSwapper-main/StashSwapper.spec
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
StashSwapper-main/StashSwapper.spec
Resource
win10v2004-20240802-en
General
-
Target
StashSwapper-main/StashSwapper.spec
-
Size
824B
-
MD5
b66add01ef71f0d3addd8471b1f1a1fd
-
SHA1
ebf55ffa07e28e138fdb8b9789d711e98b349a9c
-
SHA256
7e25954bd569627f861ee25f03d9f87634b15b1bce4078978cc7912966966d17
-
SHA512
9c00e197103af43f6fb12f41c546441af79cf6b3502aa8978e3f94c806a878750b601d9fd9c565611eed4f83b4acd0f11a92f87fc313091915ca6bb8728328b2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.spec\ = "spec_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.spec rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\spec_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2600 AcroRd32.exe 2600 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2664 2736 cmd.exe 31 PID 2736 wrote to memory of 2664 2736 cmd.exe 31 PID 2736 wrote to memory of 2664 2736 cmd.exe 31 PID 2664 wrote to memory of 2600 2664 rundll32.exe 32 PID 2664 wrote to memory of 2600 2664 rundll32.exe 32 PID 2664 wrote to memory of 2600 2664 rundll32.exe 32 PID 2664 wrote to memory of 2600 2664 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\StashSwapper-main\StashSwapper.spec1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\StashSwapper-main\StashSwapper.spec2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\StashSwapper-main\StashSwapper.spec"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52e7e8e228d5883a08f3e9512dfab0073
SHA120bd3e184d83d8bc8e0f6f8d7c9f257859d51b5a
SHA2562a9ed6d149bb011b036a43bb13d6db0525c7769adf4463f2d036cce6e544929c
SHA51229ed2677d2acfa77cbaebad67e5503f82570ffe1b5b320aede7cd480c9dba72cd0ab2860dedfa0120299c5c75c179417e17e3844820eed46de5771dbc5c1e7b3