Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT103 712022.exe
Resource
win7-20240903-en
General
-
Target
SWIFT103 712022.exe
-
Size
387KB
-
MD5
638558c2f8af532363c3180bb506c96f
-
SHA1
459e5a5caa47b028b9e2232c243eaab06a05c373
-
SHA256
773f4e455bb27130ff47db4f2d5b4b947f621173f1399cbbfa85181027a1686b
-
SHA512
7ad4334f0e67f4175f4a415747baa2babeda1b2650c7788b6e166555406e089c0eb416c26c7815900d7e31506c7412b29c82df4c0f8f1862988468f6bb9bf918
-
SSDEEP
12288:bbtN4pIlmfK59lxTbgGQCT5wA/OINDljwv:bbtlNlxgGQ+aAWINZM
Malware Config
Extracted
formbook
4.1
ja25
walkinet.com
shuifengshi.com
slowbarcelona.com
memc-gvo.com
bloquo.com
aurelashesbeauty.com
makepassiveway.com
kguvpkh.icu
benny.industries
t04mo9.com
getafurnace.com
earthadventurers.today
partsgt.com
kg0sxa1.icu
p7lzww8m.space
sarkariyojanayain.com
asp7ex4.icu
kg6u7ik.icu
h2butterfly.com
herdesirablepleasures.com
plexio.net
asalleg.icu
sunval.site
589815.com
theswissformula.com
laixetienthanh.net
okpayqb2.com
vaynganhangvpbank.com
goodluckfinancepvtltd.com
flauntstrategy.com
sexdem.net
thelittlebeercompany.com
as257gg.icu
thelittlebeercompany.com
viagemperu.com
thisisponyclub.com
cabeutolos.com
themesskits.com
ovinode.com
kglanv5.icu
bg-hyuplus.com
lotusonlineid.com
sdift.com
bgfygeu.site
rushanhkhy.com
realityjunkie.net
fastkillgaming.space
ybon.net
zyuje.top
lagital.com
subfbgiare.site
betesdunord.com
ikbaldagitim.site
asi8iwn.icu
gutro.online
kanojo.club
nhahanghaisanquycan.xyz
brandslee.com
asw87uu.icu
asr3gib.icu
askpai1.icu
matthewbrower.net
paanchlinkbanade.life
gorbacewicz.com
asu175t.icu
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2508-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2508-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2932-21-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2516 set thread context of 2508 2516 SWIFT103 712022.exe 31 PID 2508 set thread context of 1216 2508 InstallUtil.exe 21 PID 2932 set thread context of 1216 2932 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SWIFT103 712022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2516 SWIFT103 712022.exe 2516 SWIFT103 712022.exe 2516 SWIFT103 712022.exe 2516 SWIFT103 712022.exe 2516 SWIFT103 712022.exe 2516 SWIFT103 712022.exe 2508 InstallUtil.exe 2508 InstallUtil.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe 2932 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2508 InstallUtil.exe 2508 InstallUtil.exe 2508 InstallUtil.exe 2932 rundll32.exe 2932 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2516 SWIFT103 712022.exe Token: SeDebugPrivilege 2508 InstallUtil.exe Token: SeDebugPrivilege 2932 rundll32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2316 2516 SWIFT103 712022.exe 30 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 2516 wrote to memory of 2508 2516 SWIFT103 712022.exe 31 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2932 1216 Explorer.EXE 32 PID 2932 wrote to memory of 2724 2932 rundll32.exe 33 PID 2932 wrote to memory of 2724 2932 rundll32.exe 33 PID 2932 wrote to memory of 2724 2932 rundll32.exe 33 PID 2932 wrote to memory of 2724 2932 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\SWIFT103 712022.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT103 712022.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:2316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-