Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-it -
resource tags
arch:x64arch:x86image:win7-20240903-itlocale:it-itos:windows7-x64systemwindows -
submitted
08-01-2025 17:45
Static task
static1
Behavioral task
behavioral1
Sample
SWA V1.62.rar
Resource
win7-20240903-it
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
SWA V1.62.rar
Resource
win10v2004-20241007-it
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
SWA V1.62.rar
-
Size
1.1MB
-
MD5
6e1efefb3225679ae03ef936c3c81575
-
SHA1
c9e7de5bbff3bc0782b1e91023a7ff8fd9976688
-
SHA256
42b828b9a12a08d6d54cef29054a65c8e3d47147e67d40237b2decca4809c60f
-
SHA512
6df9f84e64ac7fe10bb552866c65291a9007c661d53244eae729267b27291c3a3e61bed89cbea9ff7826a01f3c82185625688ec9c1820812364fece091cef7f9
-
SSDEEP
24576:pLq3QBPdv3XalrWfiODoUKooLRuIwatKRLRGVuVPtUx7skxZNXptpfcQ:kQP3XgqiODtoLgLwaUhN5PEQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2196 7zFM.exe 556 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2196 7zFM.exe Token: 35 2196 7zFM.exe Token: SeSecurityPrivilege 2196 7zFM.exe Token: SeSecurityPrivilege 2196 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2196 7zFM.exe 2196 7zFM.exe 2196 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 2128 556 rundll32.exe 38 PID 556 wrote to memory of 2128 556 rundll32.exe 38 PID 556 wrote to memory of 2128 556 rundll32.exe 38
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SWA V1.62.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2196
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:832
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SWA V1.62.rar1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SWA V1.62.rar2⤵
- Modifies registry class
PID:2128
-