Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT MESAJI.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SWIFT MESAJI.exe
Resource
win10v2004-20241007-en
General
-
Target
SWIFT MESAJI.exe
-
Size
1.2MB
-
MD5
7ef6937a8ea22984c7813428b34e23d1
-
SHA1
9912e5e94ebaa4b5e65447e8163263c23aeaeda1
-
SHA256
03006120b1728d62761c857dd882bc02f27dd07954f22ba259edd6484b0be0f2
-
SHA512
6f49979e1967e86757912ededce8a5afe904907725ee8cb744a42287df9a7cbe97e157f767de0428dae833024694a355dfbbf508ba0aca2b11cfda3236bec461
-
SSDEEP
24576:/tb20pkaCqT5TBWgNQ7a63xnExMwBYI9DS7auk6A:8Vg5tQ7a6hnBkdL5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2072 set thread context of 4140 2072 SWIFT MESAJI.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SWIFT MESAJI.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe 4140 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2072 SWIFT MESAJI.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2072 SWIFT MESAJI.exe 2072 SWIFT MESAJI.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2072 SWIFT MESAJI.exe 2072 SWIFT MESAJI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4140 2072 SWIFT MESAJI.exe 86 PID 2072 wrote to memory of 4140 2072 SWIFT MESAJI.exe 86 PID 2072 wrote to memory of 4140 2072 SWIFT MESAJI.exe 86 PID 2072 wrote to memory of 4140 2072 SWIFT MESAJI.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5a5f62f7806cc565c48b6b94b81b33d58
SHA1c2b450bb77c3fbe31203944b1413e6c0a1fc6e2a
SHA2564f9fdafa59911fdcab09dd4b817681797b555ebbbac8d0f2c89a1dff13f76993
SHA512cfa60c9b2191c9978e9d5e171c17e69fe49c48c7ccbd918e10c3c17dd1ecff3991b90cff69ab1921c1dc370297c25ecebeaca3c6bb63f5d016d0bdf51d962c66