Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT103 712022.exe
Resource
win7-20240903-en
General
-
Target
SWIFT103 712022.exe
-
Size
387KB
-
MD5
638558c2f8af532363c3180bb506c96f
-
SHA1
459e5a5caa47b028b9e2232c243eaab06a05c373
-
SHA256
773f4e455bb27130ff47db4f2d5b4b947f621173f1399cbbfa85181027a1686b
-
SHA512
7ad4334f0e67f4175f4a415747baa2babeda1b2650c7788b6e166555406e089c0eb416c26c7815900d7e31506c7412b29c82df4c0f8f1862988468f6bb9bf918
-
SSDEEP
12288:bbtN4pIlmfK59lxTbgGQCT5wA/OINDljwv:bbtlNlxgGQ+aAWINZM
Malware Config
Extracted
formbook
4.1
ja25
walkinet.com
shuifengshi.com
slowbarcelona.com
memc-gvo.com
bloquo.com
aurelashesbeauty.com
makepassiveway.com
kguvpkh.icu
benny.industries
t04mo9.com
getafurnace.com
earthadventurers.today
partsgt.com
kg0sxa1.icu
p7lzww8m.space
sarkariyojanayain.com
asp7ex4.icu
kg6u7ik.icu
h2butterfly.com
herdesirablepleasures.com
plexio.net
asalleg.icu
sunval.site
589815.com
theswissformula.com
laixetienthanh.net
okpayqb2.com
vaynganhangvpbank.com
goodluckfinancepvtltd.com
flauntstrategy.com
sexdem.net
thelittlebeercompany.com
as257gg.icu
thelittlebeercompany.com
viagemperu.com
thisisponyclub.com
cabeutolos.com
themesskits.com
ovinode.com
kglanv5.icu
bg-hyuplus.com
lotusonlineid.com
sdift.com
bgfygeu.site
rushanhkhy.com
realityjunkie.net
fastkillgaming.space
ybon.net
zyuje.top
lagital.com
subfbgiare.site
betesdunord.com
ikbaldagitim.site
asi8iwn.icu
gutro.online
kanojo.club
nhahanghaisanquycan.xyz
brandslee.com
asw87uu.icu
asr3gib.icu
askpai1.icu
matthewbrower.net
paanchlinkbanade.life
gorbacewicz.com
asu175t.icu
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2316-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2316-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4616-18-0x0000000000600000-0x000000000062F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1964 set thread context of 2316 1964 SWIFT103 712022.exe 82 PID 2316 set thread context of 3500 2316 InstallUtil.exe 56 PID 4616 set thread context of 3500 4616 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SWIFT103 712022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 SWIFT103 712022.exe 1964 SWIFT103 712022.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe 4616 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2316 InstallUtil.exe 2316 InstallUtil.exe 2316 InstallUtil.exe 4616 chkdsk.exe 4616 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2316 InstallUtil.exe Token: SeDebugPrivilege 4616 chkdsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 1964 wrote to memory of 2316 1964 SWIFT103 712022.exe 82 PID 3500 wrote to memory of 4616 3500 Explorer.EXE 83 PID 3500 wrote to memory of 4616 3500 Explorer.EXE 83 PID 3500 wrote to memory of 4616 3500 Explorer.EXE 83 PID 4616 wrote to memory of 2916 4616 chkdsk.exe 84 PID 4616 wrote to memory of 2916 4616 chkdsk.exe 84 PID 4616 wrote to memory of 2916 4616 chkdsk.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\SWIFT103 712022.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT103 712022.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-