Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 22:30
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
swift.exe
Resource
win7-20240903-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
swift.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
swift.exe
-
Size
996KB
-
MD5
17a7feed2e38ee63d467a6adda8fd604
-
SHA1
103ce31f4b3e7c040bd97f09262b44788c064827
-
SHA256
f3a2990ee13d135a48a1e392882b4386be4259704ad4ac2e82398901bf1313b3
-
SHA512
599d54a09a0151f6288d415f1499bfaed34000cf473aa2ae07caa2dc350219f35bcc98ecd60b55e4601f50c68a0e50e53909a22a0cbc4e31ae39a980f6a3d681
-
SSDEEP
24576:Wtb20pkaCqT5TBWgNQ7a7R8vY/ujlvYw6A:DVg5tQ7a7r/uRvd5
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1244 2508 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swift.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2104 2508 swift.exe 83 PID 2508 wrote to memory of 2104 2508 swift.exe 83 PID 2508 wrote to memory of 2104 2508 swift.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\swift.exe"C:\Users\Admin\AppData\Local\Temp\swift.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\swift.exe"2⤵PID:2104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 6322⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2508 -ip 25081⤵PID:3896