Overview
overview
10Static
static
10BidvestBan...re.exe
windows7-x64
BidvestBan...re.exe
windows10-2004-x64
BidvestBan...ed.exe
windows7-x64
BidvestBan...ed.exe
windows10-2004-x64
BidvestBan...el.exe
windows7-x64
BidvestBan...el.exe
windows10-2004-x64
BidvestBan...on.exe
windows7-x64
BidvestBan...on.exe
windows10-2004-x64
BidvestBan...re.exe
windows7-x64
BidvestBan...re.exe
windows10-2004-x64
BidvestBan...ed.exe
windows7-x64
BidvestBan...ed.exe
windows10-2004-x64
Swift-Beac...ed.exe
windows7-x64
1Swift-Beac...ed.exe
windows10-2004-x64
1Swift-Slee...ss.exe
windows7-x64
1Swift-Slee...ss.exe
windows10-2004-x64
1Swift-Stag...ed.exe
windows7-x64
1Swift-Stag...ed.exe
windows10-2004-x64
1Swift-serv...ed.exe
windows7-x64
1Swift-serv...ed.exe
windows10-2004-x64
1Swift-slee...ts.dll
windows7-x64
3Swift-slee...ts.dll
windows10-2004-x64
3demon.x64.exe
windows7-x64
1demon.x64.exe
windows10-2004-x64
1demon.x641.exe
windows7-x64
1demon.x641.exe
windows10-2004-x64
1index.html
windows7-x64
3index.html
windows10-2004-x64
3index.html
windows7-x64
3index.html
windows10-2004-x64
3swift-bypa...ts.exe
windows7-x64
1swift-bypa...ts.exe
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 08:19
Behavioral task
behavioral1
Sample
BidvestBank-Swift--DNS-evasion-encrypted-no-cloudflare.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BidvestBank-Swift--DNS-evasion-encrypted-no-cloudflare.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BidvestBank-Swift-AD686-evasion-encrypted.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BidvestBank-Swift-AD686-evasion-encrypted.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BidvestBank-Swift-DNS-Tunnel.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
BidvestBank-Swift-DNS-Tunnel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
BidvestBank-Swift-Manual-Evasion.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
BidvestBank-Swift-Manual-Evasion.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
BidvestBank-Swift-evasion-encrypted-no-cloudflare.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
BidvestBank-Swift-evasion-encrypted-no-cloudflare.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
BidvestBank-Swift-ssh-evasion-encrypted.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
BidvestBank-Swift-ssh-evasion-encrypted.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Swift-Beacon-Encrypted.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Swift-Beacon-Encrypted.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Swift-Sleep-bypass.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Swift-Sleep-bypass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Swift-Stage1-Obfuscated.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Swift-Stage1-Obfuscated.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Swift-service-encrypted-obuscated.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Swift-service-encrypted-obuscated.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Swift-sleep10-jitter-50-amsiPatch-Breakpoints.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Swift-sleep10-jitter-50-amsiPatch-Breakpoints.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
demon.x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
demon.x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
demon.x641.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
demon.x641.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
index.html
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
index.html
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
swift-bypass-breakpoints.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
swift-bypass-breakpoints.exe
Resource
win10v2004-20241007-en
General
-
Target
index.html
-
Size
4KB
-
MD5
5ddae141accb377a8e93b1cd3336d683
-
SHA1
764a599646237bcf8a252a389042ed2b9dcaada5
-
SHA256
1e3956c57206e1bb9bab9d8559456e8f0779cba7d9908ef37f5fd5c07c1d2b21
-
SHA512
eb9b9723454beffac57c325a120487e08060797db33aaacb1f654160a90beb939daecbe44506d72ba77d5494748821f24d175d14d5a4772fdbf36e2767acd092
-
SSDEEP
96:ZznRJ/ZlS7LlHJlOtY8Fi0R91FJS8d7M++3td5H5Csgfn:ZbRJ/PS7LhJQa8Fi0R91FJSkRAL5Csgf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0F5A41-8D29-11EF-BC71-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000294e7afa82a580a92ec6c9ef7f51b4d2e0136152514d13e6e2191781b29fe876000000000e8000000002000020000000ed9940fdd0052154713222572363de7857e3c3c8564b6a2169665efed8854d729000000053bf38f29418ef60a72b95b0f15974d79ee70311c2446ec2bd0b3fcad2ac50786f677be1be87abfb084ffa04db0d591224b599adeebc5106e4c855f8989ea47c1179a6b6acbf389ea8b4f59aad31b534224b1e8e0bca60758b2bfe57b0dfc23a7ba0c5e78603443f27d43077eccfebb632f7b7688cbcabe3c1da7906212fa490496e0d6319702d5ce63cdad6376853b74000000041836543c557af60c422b5ed51d280de6b87e05f451be7fe9a8ae195e87ae34409eb47182f5f1fc72aa54ac20c0395b5e5b887ece37047f6fd057759b26da738 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c33904c83b39efe009fc9ad3b3cb5dc6d8d338bea4d39c6a2f9709ee127ae909000000000e8000000002000020000000928bb60705cb1d78a2fa63c02f0bafe3817f92166b1c22fb937c9ba774062b36200000006b80652b9b73fce48bce8837cfb9a22d0a95e8b1347f63bd7ae3d0312c66c12440000000056a2105c3d3302dee5f0975f37792575ade3f265673d24e9c10de06e263add352a368a177cec8b211b0b2850f174e4a51d8bdea5c178a94e85515572af77cfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dc519d3621db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435401442" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2288 iexplore.exe 2288 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2288 wrote to memory of 2120 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2120 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2120 2288 iexplore.exe IEXPLORE.EXE PID 2288 wrote to memory of 2120 2288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321dfe721e0678acf57042fbbb238978
SHA1f5cc04ebc7696196649b8528b42eba14c55b049d
SHA256eca0c94d3f85bf855c821b8144a921e121778a34fafbf6462d56533377c1b8ec
SHA51264244368c7bcd89879217017c41432c32496bd1b80ff0427033f2bb69f25a5c414cfcf669d223f9b52f326bc7d508a9959480e79efd96cc801af4f2f08f714cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc5d599270b663eebe9a32985bda856
SHA10b5ade8ab547f4322ce4a046046c65f3848f3c04
SHA256b5c1c6e7a8159666164b5ce9f91c0650cf4a5e74151a93db1eaecf6280e5ac92
SHA51249f41e6056dc4e98f17d032c3aaee5257967febae32f933d629ee678d11a9343f7e560f3fc3ad092cb166bfad914b9c89954aec23a53ea098f1fd3ff8c5aa967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b19b59e56836651a10e5533e33121b2
SHA1ba7fba2877d8f89db1181846982625fa1c65190e
SHA2564fe578d83e634e2213268ee201465eec024601bea99af71dbaf55502964129ea
SHA5127133c8bb4d52084eaa3b9c2269761d1567f37e436159aa54a30e13adfbb3cd97d206646163d8818a9a9f0daf4a8d491828371caa136eba64ad9bd7a33b1fd83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a9da76cecab0adf48806b06e56efbe
SHA10580cb108f234c9c923753769698e9e727891cba
SHA256acc5851059d43fd6ec3db24af688f0449f6666d8bc6b73d987a1d34c2a47c422
SHA51225e8b5201d5536ea46dba9837e9d2d516771a3a027fa6f4d8f1ef670758288fe9ae5a65e7313e313249b6f7f3d194d0857ee9ef29c9f15466ca0fa0174510383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3e7021ec4517f4c604c0eeae45e010
SHA149d77f4a3f52cb774fd275ebc2d0be262387e0c2
SHA25633fedcbf084885a5f2ac59333c954cfea262646ac6f615816da5e54d9d3c58dd
SHA5124ea05f8a224f6703545a8118438e9926030b5fa1502ab309fd14c62276522fc353583af24fbcbba05aa529cf52be31c81758947734c2b66f4b83f654f8fcfa15
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b