Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY.exe
Resource
win7-20241010-en
General
-
Target
SWIFT COPY.exe
-
Size
491KB
-
MD5
1e83fcc22cccdab1b97887b371f4b8d4
-
SHA1
1f2ae9417601ffea6c57643a7b56e78b50c8cb2d
-
SHA256
ba2bf5801650d3b1efe26350bdca102f606dc7622ad4908c414789ef5c0f24b3
-
SHA512
f5b2fa7f380d3deabc4fe346704f8689ba8b64962080aee843c346c44b98a059db743aacb301725b22c6a7dcc34c3f5810baadaed7e6e880e8bfaa7ac1fcb29d
-
SSDEEP
6144:a8mQxbxKRcW/+sbJT4nwWQjqsV0KdYetrjstIoT5GWeuWiKASr:a8mqbx1C+6inwWQjLr2moToWaiW
Malware Config
Extracted
formbook
4.1
rhk
decodemethod.com
mamakeyfim.xyz
3smokers.com
rentaspendirect.com
projectstasksjobs.com
animedesignetees.com
ursthegardennurse.com
sunandmoonshirts.com
encuentros-es.com
nevadahomebirth.com
xoxoplants.com
tentenos.com
anhpham.net
beyondtourney.com
surfficient.com
wannahavedays.online
hmyhvgxax.icu
holisticskincarecompany.com
juggfuckers.com
ixgrmz.com
chant4yourlife.com
clgfzqgw.com
pandemiclearningpodsfairfax.com
pagmorlormun.com
m4ufred.com
xn--yaaou-zra.com
kai-tan.com
letstalkmamahk.com
nettbasertutdanning.com
phantheon.com
sweet-elite.com
eyepointph.com
hand-madebyrae.com
mexikanno.com
dunkerque-dentiste.com
novusingeniumgroup.com
fadin.xyz
azmro.com
vistaar.world
sobrietees.net
landschaftstechnik.com
roofingguidesite.com
betboo507.com
fromcelltosell.com
amianinfluencer.com
grayboxus.com
lamnhistudio.com
chyjzs.com
zhinengjiashiche.com
pchcmgrant.com
jnyijia.com
elementx.agency
izhangdong.com
topsit.website
travelswithsonny.com
traceqeisiholdings.com
audio-tron.com
moonstarinfinity.com
dream11exch9.com
pocketfieldtrip.com
mdsport-eg.com
southshoreagles.com
275353074.com
kgmba.net
purebodyrecovery.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3304-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3304-10-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation SWIFT COPY.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1144 set thread context of 3304 1144 SWIFT COPY.exe 83 PID 3304 set thread context of 3360 3304 SWIFT COPY.exe 55 PID 2616 set thread context of 3360 2616 control.exe 55 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SWIFT COPY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1144 SWIFT COPY.exe 3304 SWIFT COPY.exe 3304 SWIFT COPY.exe 3304 SWIFT COPY.exe 3304 SWIFT COPY.exe 1144 SWIFT COPY.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe 2616 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3304 SWIFT COPY.exe 3304 SWIFT COPY.exe 3304 SWIFT COPY.exe 2616 control.exe 2616 control.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1144 SWIFT COPY.exe Token: 33 1144 SWIFT COPY.exe Token: SeIncBasePriorityPrivilege 1144 SWIFT COPY.exe Token: SeDebugPrivilege 3304 SWIFT COPY.exe Token: SeShutdownPrivilege 3360 Explorer.EXE Token: SeCreatePagefilePrivilege 3360 Explorer.EXE Token: SeShutdownPrivilege 3360 Explorer.EXE Token: SeCreatePagefilePrivilege 3360 Explorer.EXE Token: SeShutdownPrivilege 3360 Explorer.EXE Token: SeCreatePagefilePrivilege 3360 Explorer.EXE Token: SeDebugPrivilege 2616 control.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 1144 wrote to memory of 3304 1144 SWIFT COPY.exe 83 PID 3360 wrote to memory of 2616 3360 Explorer.EXE 84 PID 3360 wrote to memory of 2616 3360 Explorer.EXE 84 PID 3360 wrote to memory of 2616 3360 Explorer.EXE 84 PID 1144 wrote to memory of 452 1144 SWIFT COPY.exe 85 PID 1144 wrote to memory of 452 1144 SWIFT COPY.exe 85 PID 1144 wrote to memory of 452 1144 SWIFT COPY.exe 85 PID 1144 wrote to memory of 4368 1144 SWIFT COPY.exe 87 PID 1144 wrote to memory of 4368 1144 SWIFT COPY.exe 87 PID 1144 wrote to memory of 4368 1144 SWIFT COPY.exe 87 PID 4368 wrote to memory of 2756 4368 cmd.exe 89 PID 4368 wrote to memory of 2756 4368 cmd.exe 89 PID 4368 wrote to memory of 2756 4368 cmd.exe 89 PID 1144 wrote to memory of 4792 1144 SWIFT COPY.exe 90 PID 1144 wrote to memory of 4792 1144 SWIFT COPY.exe 90 PID 1144 wrote to memory of 4792 1144 SWIFT COPY.exe 90 PID 2616 wrote to memory of 3100 2616 control.exe 93 PID 2616 wrote to memory of 3100 2616 control.exe 93 PID 2616 wrote to memory of 3100 2616 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"C:/Users/Admin/AppData/Local/Temp/SWIFT COPY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/SWIFT COPY.exe" "%temp%\FolderN\name.exe" /Y3⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f4⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier3⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4792
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD51e83fcc22cccdab1b97887b371f4b8d4
SHA11f2ae9417601ffea6c57643a7b56e78b50c8cb2d
SHA256ba2bf5801650d3b1efe26350bdca102f606dc7622ad4908c414789ef5c0f24b3
SHA512f5b2fa7f380d3deabc4fe346704f8689ba8b64962080aee843c346c44b98a059db743aacb301725b22c6a7dcc34c3f5810baadaed7e6e880e8bfaa7ac1fcb29d