IOC Report
SWIFT.exe

loading gif

Files

File Path
Type
Category
Malicious
SWIFT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SWIFT.exe_6ba9e42d76a4b86721d9da572c2972bbfa16e19_f16bf124_9885bf37-19c4-43a3-a861-79abd96e7ef6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2531.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 05:43:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2736.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2766.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SWIFT.exe.log
ASCII text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SWIFT.exe
"C:\Users\user\Desktop\SWIFT.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 1424

URLs

Name
IP
Malicious
http://mail.quoctoan.vn
unknown
http://upx.sf.net
unknown
http://mail92152.maychuemail.com
unknown
https://account.dyn.com/
unknown
http://www.magicspam.com
unknown

Domains

Name
IP
Malicious
mail92152.maychuemail.com
112.213.92.152
malicious
mail.quoctoan.vn
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
112.213.92.152
mail92152.maychuemail.com
Viet Nam
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
ProgramId
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
FileId
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
LowerCaseLongPath
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
LongPathHash
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Name
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
OriginalFileName
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Publisher
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Version
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
BinFileVersion
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
BinaryType
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
ProductName
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
ProductVersion
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
LinkDate
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
BinProductVersion
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
AppxPackageFullName
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
AppxPackageRelativeId
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Size
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Language
\REGISTRY\A\{2e541965-9c2d-793d-7adf-393c80e44a02}\Root\InventoryApplicationFile\swift.exe|c33a59c2f12bc04b
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EF1000
trusted library allocation
page read and write
malicious
3869000
trusted library allocation
page read and write
malicious
45B7000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F3F000
trusted library allocation
page read and write
malicious
5340000
trusted library section
page read and write
malicious
5BA8000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
52CE000
stack
page read and write
5375000
heap
page read and write
10A0000
heap
page read and write
547B000
trusted library allocation
page read and write
5320000
trusted library allocation
page execute and read and write
514E000
stack
page read and write
561C000
stack
page read and write
73C0000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
61A6000
heap
page read and write
DD3000
trusted library allocation
page read and write
796E000
heap
page read and write
64E0000
trusted library allocation
page read and write
649F000
stack
page read and write
2F57000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
5150000
heap
page read and write
549D000
trusted library allocation
page read and write
64DE000
stack
page read and write
4DC1000
trusted library allocation
page read and write
4A39000
stack
page read and write
FAE000
stack
page read and write
57CE000
stack
page read and write
10E8000
heap
page read and write
578F000
stack
page read and write
10E5000
heap
page read and write
70D0000
trusted library section
page read and write
5A0E000
stack
page read and write
600000
unkown
page readonly
7942000
heap
page read and write
AEAA000
trusted library allocation
page read and write
B95000
heap
page read and write
548A000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
493B000
stack
page read and write
4D80000
trusted library allocation
page execute and read and write
FB8000
heap
page read and write
551C000
stack
page read and write
4DF0000
trusted library allocation
page read and write
A7F000
heap
page read and write
547E000
trusted library allocation
page read and write
550000
unkown
page readonly
2C70000
trusted library allocation
page read and write
E5A000
stack
page read and write
2C82000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page execute and read and write
5330000
heap
page read and write
FB0000
heap
page read and write
DC3000
trusted library allocation
page execute and read and write
6400000
trusted library allocation
page execute and read and write
2C60000
trusted library allocation
page read and write
DE6000
trusted library allocation
page execute and read and write
115E000
heap
page read and write
13A3000
trusted library allocation
page execute and read and write
64F0000
trusted library allocation
page read and write
568E000
stack
page read and write
7908000
heap
page read and write
10B0000
heap
page read and write
63FD000
stack
page read and write
5630000
heap
page execute and read and write
B00000
heap
page read and write
510B000
stack
page read and write
13B0000
heap
page read and write
2CA0000
trusted library allocation
page read and write
4257000
trusted library allocation
page read and write
6E20000
heap
page read and write
411E000
trusted library allocation
page read and write
4F20000
heap
page read and write
40D0000
trusted library allocation
page read and write
4F10000
trusted library section
page readonly
6E2E000
heap
page read and write
F02000
trusted library allocation
page read and write
B90000
heap
page read and write
58CF000
stack
page read and write
1188000
heap
page read and write
B290000
trusted library allocation
page read and write
705E000
stack
page read and write
F07000
trusted library allocation
page execute and read and write
B05000
heap
page read and write
FB0000
heap
page read and write
741D000
stack
page read and write
4DBE000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
5370000
heap
page read and write
5433000
heap
page read and write
4DCD000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page execute and read and write
E48E000
stack
page read and write
4DA0000
trusted library allocation
page read and write
A75000
heap
page read and write
4DC6000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
F59000
stack
page read and write
13A0000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
530E000
stack
page read and write
E94E000
stack
page read and write
FC5000
heap
page read and write
5170000
trusted library allocation
page execute and read and write
FF780000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
4ED0000
trusted library allocation
page execute and read and write
2AD6000
trusted library allocation
page read and write
1136000
heap
page read and write
3EF1000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
13AD000
trusted library allocation
page execute and read and write
2C87000
trusted library allocation
page execute and read and write
B390000
trusted library section
page read and write
5482000
trusted library allocation
page read and write
A10000
heap
page read and write
4FED000
stack
page read and write
6B10000
heap
page read and write
73D5000
trusted library allocation
page read and write
63A6000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
1220000
heap
page read and write
F50000
heap
page execute and read and write
4EA0000
trusted library allocation
page read and write
7071000
trusted library allocation
page read and write
115A000
heap
page read and write
547F000
stack
page read and write
2C8B000
trusted library allocation
page execute and read and write
5BA0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page execute and read and write
73B0000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
4F30000
heap
page read and write
5496000
trusted library allocation
page read and write
2C85000
trusted library allocation
page execute and read and write
416C000
trusted library allocation
page read and write
3EF9000
trusted library allocation
page read and write
FC0000
heap
page read and write
D6F000
stack
page read and write
2B53000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
1129000
heap
page read and write
552000
unkown
page readonly
1390000
trusted library allocation
page read and write
7900000
heap
page read and write
A4E000
heap
page read and write
5430000
heap
page read and write
797000
stack
page read and write
61A0000
heap
page read and write
2C72000
trusted library allocation
page read and write
DDD000
trusted library allocation
page execute and read and write
DD0000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
7297000
heap
page read and write
E44D000
stack
page read and write
2AD4000
trusted library allocation
page read and write
13A4000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
590E000
stack
page read and write
5476000
trusted library allocation
page read and write
5CB0000
heap
page read and write
2F3D000
trusted library allocation
page read and write
669E000
stack
page read and write
70BE000
stack
page read and write
2B00000
trusted library allocation
page read and write
7180000
trusted library allocation
page execute and read and write
54C0000
trusted library allocation
page read and write
E650000
heap
page read and write
285E000
stack
page read and write
A82000
heap
page read and write
F20000
trusted library allocation
page read and write
A67000
heap
page read and write
4E05000
trusted library allocation
page read and write
5440000
trusted library allocation
page execute and read and write
4DA4000
trusted library allocation
page read and write
6CB0000
heap
page read and write
5C9E000
stack
page read and write
F30000
heap
page read and write
DC0000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
F0B000
trusted library allocation
page execute and read and write
114E000
heap
page read and write
E64D000
stack
page read and write
2CEE000
stack
page read and write
2DE0000
heap
page execute and read and write
2EEF000
stack
page read and write
400000
remote allocation
page execute and read and write
5160000
trusted library allocation
page read and write
A00000
heap
page read and write
61AE000
heap
page read and write
2D2C000
stack
page read and write
64E7000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
7060000
trusted library section
page read and write
6218000
heap
page read and write
6AE0000
trusted library allocation
page read and write
5CD4000
heap
page read and write
DCD000
trusted library allocation
page execute and read and write
5474000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
620D000
heap
page read and write
5180000
heap
page execute and read and write
731D000
heap
page read and write
DE0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page execute and read and write
5CA0000
heap
page read and write
4E60000
heap
page read and write
B02000
heap
page read and write
1200000
heap
page read and write
4EC0000
trusted library allocation
page read and write
7522000
trusted library allocation
page read and write
5360000
trusted library allocation
page execute and read and write
4EF0000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
B7E000
stack
page read and write
F60000
heap
page read and write
DAE000
stack
page read and write
3F5B000
trusted library allocation
page read and write
2C76000
trusted library allocation
page execute and read and write
548E000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
DF0000
heap
page read and write
528E000
stack
page read and write
DEA000
trusted library allocation
page execute and read and write
2D30000
heap
page read and write
2C80000
trusted library allocation
page read and write
EFE000
stack
page read and write
10B8000
heap
page read and write
7904000
heap
page read and write
728F000
stack
page read and write
63B0000
trusted library allocation
page execute and read and write
A48000
heap
page read and write
E84E000
stack
page read and write
B0E000
heap
page read and write
61C0000
heap
page read and write
69A000
stack
page read and write
5B9E000
stack
page read and write
10DA000
heap
page read and write
4F33000
heap
page read and write
7100000
trusted library allocation
page read and write
6F5E000
stack
page read and write
2861000
trusted library allocation
page read and write
There are 250 hidden memdumps, click here to show them.