Loading ...

Play interactive tourEdit tour

Analysis Report Bank Swift.exe

Overview

General Information

Sample Name:Bank Swift.exe
Analysis ID:326331
MD5:2ace5c4532c77c014a02cc027d725d83
SHA1:c5d7fd7b905ec976af21fb78f7fbbb516767da2f
SHA256:53ae2502a9fed69821959a54927023f131c6e62ebc46119d86e2eaad60356827
Tags:exe

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Machine Learning detection for sample
PE file has a writeable .text section
Checks if the current process is being debugged
Enables debug privileges
One or more processes crash
PE file contains strange resources
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Stores large binary data to the registry
Tries to load missing DLLs

Classification

Startup

  • System is w10x64
  • Bank Swift.exe (PID: 7028 cmdline: 'C:\Users\user\Desktop\Bank Swift.exe' MD5: 2ACE5C4532C77C014A02CC027D725D83)
    • WerFault.exe (PID: 7096 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7028 -s 216 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: Bank Swift.exeJoe Sandbox ML: detected

System Summary:

barindex
PE file has a writeable .text sectionShow sources
Source: Bank Swift.exeStatic PE information: Section: .text IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7028 -s 216
Source: Bank Swift.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Bank Swift.exeStatic PE information: No import functions for PE file found
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: phoneinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: classification engineClassification label: mal48.winEXE@2/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7028
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F7D.tmpJump to behavior
Source: C:\Users\user\Desktop\Bank Swift.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Bank Swift.exe 'C:\Users\user\Desktop\Bank Swift.exe'
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7028 -s 216
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.339241525.00000000055B1000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.339241525.00000000055B1000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.339241525.00000000055B1000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.339241525.00000000055B1000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000003.00000003.339241525.00000000055B1000.00000004.00000001.sdmp
Source: C:\Windows\SysWOW64\WerFault.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} DeviceTicketJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: PhysicalDrive0Jump to behavior
Source: WerFault.exe, 00000003.00000002.372060807.0000000005320000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000003.00000002.372060807.0000000005320000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000003.00000002.372060807.0000000005320000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000003.00000002.372060807.0000000005320000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\SysWOW64\WerFault.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Swift.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess token adjusted: DebugJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection1Modify Registry1OS Credential DumpingSecurity Software Discovery21Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSSystem Information Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Bank Swift.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:326331
Start date:03.12.2020
Start time:09:57:46
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:Bank Swift.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:19
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.winEXE@2/4@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 104.43.139.144, 51.104.144.132, 104.42.151.234, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 51.103.5.159, 92.122.213.247, 92.122.213.194, 51.11.168.160, 92.122.144.200
  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net

Simulations

Behavior and APIs

TimeTypeDescription
09:58:55API Interceptor1x Sleep call for process: WerFault.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Bank Swift.exe_80879c17d1924b75c27e84dfcffed9edc11fd3_314a8f1f_1bfaced8\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):7724
Entropy (8bit):3.7592295138448635
Encrypted:false
SSDEEP:96:rUrWs7VUZAQEh8O75f0pXIQcQvc6QcEDMcw3DL+HbHg0c/NZAXGng5FMTPSkvPk3:wrhJUZAwHBUZMXojh/u7slS274Itwc
MD5:A3062D7453C3D6CBA795C8E48515A971
SHA1:2727FF3D64A74B85C3E6B34AF1620980C8A57101
SHA-256:EE52CD117C41E0F3700BD787EB611A398EFE7EA6287790B2B0F01E51125F7E95
SHA-512:074EAD4BE739ECD4D63163A3A2835A70F739645319DA8BE1E32477DB0B71022025F68BDDCE9565F24B2A56486888847E2E2E608D2AA20F2E10761094E7EBC521
Malicious:true
Reputation:low
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.1.4.9.1.9.2.1.9.2.1.7.1.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.1.4.9.1.9.2.4.9.2.1.7.0.5.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.0.1.c.6.e.5.b.-.7.2.9.3.-.4.e.1.7.-.9.b.f.8.-.9.f.2.0.e.e.a.0.3.c.f.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.3.c.3.3.6.9.e.-.8.3.6.e.-.4.5.b.0.-.b.1.7.a.-.4.a.5.2.2.d.2.0.7.d.c.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.B.a.n.k. .S.w.i.f.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.7.4.-.0.0.0.1.-.0.0.1.7.-.a.e.3.0.-.c.a.e.d.9.d.c.9.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.2.3.e.3.2.9.6.1.5.b.b.0.9.0.9.4.8.8.b.5.c.7.2.f.3.2.a.1.5.e.5.0.0.0.0.f.f.f.f.!.0.0.0.0.c.5.d.7.f.d.7.b.9.0.5.e.c.9.7.6.a.f.2.1.f.b.7.8.f.7.f.b.b.b.5.1.6.7.6.7.d.a.2.f.!.B.a.n.k. .S.w.i.f.t...e.x.e.....T.a.r.g.e.t.
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F7D.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Thu Dec 3 17:58:42 2020, 0x1205a4 type
Category:dropped
Size (bytes):18256
Entropy (8bit):2.159165985339814
Encrypted:false
SSDEEP:96:5HKs8Q/DhBUJC0JuhN1GE8gfCUrfn1bgkMiTpTQuLnJ+TxWInWIX4I4n5i/DnvA:4g1BUJC0JcNDC8RM8TTrJ+KnUbnvA
MD5:D4556B67004A21DD871FEEC108AFC10C
SHA1:318CA739D60B783DBC5DC3BB2DBB3EDB215896DB
SHA-256:34AB0A4D1C243F9498928D4B6FDA1E77E63C6E8727F451D9F18F4CD59FC4823F
SHA-512:78444B741A5240A32205A909631E27F3F7CD67E83DB4BCA066C194E14C1449C4C83C93277D2C4B2D602BD95A38D17E56176321AA42F2694A5B1E30A145B8FD61
Malicious:false
Reputation:low
Preview: MDMP....... .......R'._...................U...........B..............GenuineIntelW...........T.......t...O'._.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2114.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8284
Entropy (8bit):3.698943372303405
Encrypted:false
SSDEEP:192:Rrl7r3GLNiFih6p0JQ9fC6YJdSUJd6EgmfXSaCprt89b/1sf08v1m:RrlsNish6Z9fC6YDSUJd6EgmfXS4/OfI
MD5:E32E49AC580A06173092EEAD03451D4B
SHA1:FEB773079E493A51F616B86F3C292CAE1B4EBC4C
SHA-256:17DD8D365D235E2D8C7099D832AEF9E7136F01C84BC1B5EF66505BB0F87517C3
SHA-512:39130C14E19A81DAC1B772A2349F4E4A340604A693008503961165911875D095B119A196699C1945646FAC02547570D856CDFDA5CDA4BBDAAEBF0756AE638BF8
Malicious:false
Reputation:low
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.2.8.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2338.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4566
Entropy (8bit):4.455773285336386
Encrypted:false
SSDEEP:48:cvIwSD8zs1iJgtWI9OAWSC8Bls8fm8M4JpYFM+q8QaoJkwv6wXQd:uITf6F5SNRJvUoOwv6wXQd
MD5:6FF1BF1AB8ACFFDBF8871C01989AE3FC
SHA1:03909BE42171A3778594162DC5934E05E57E8A67
SHA-256:077EDE95E1BCFB4C4CB68F88DD91E845C9B9DB4B4A607149FD0B9C38E52D23DF
SHA-512:664821FCD28F72F7E28B2531B3E34E2D9F492DCACE38D6D7D126338F9840EA0D083185C3B0425FC6A615D2C345DABB00B3437D8954D70F975607E99FD039B450
Malicious:false
Reputation:low
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="756189" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.306275307055633
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
File name:Bank Swift.exe
File size:633856
MD5:2ace5c4532c77c014a02cc027d725d83
SHA1:c5d7fd7b905ec976af21fb78f7fbbb516767da2f
SHA256:53ae2502a9fed69821959a54927023f131c6e62ebc46119d86e2eaad60356827
SHA512:0ea190a125f3c27c8ed6feb6533ec8904cf34faef62517fa3f70e528bbc21870637bef7236360f46e53e7cbeaf8cd5b646416c1029901dc150684ecd46a9457f
SSDEEP:6144:Kd9vx8vk3Ouk2wlpF3W/FVvG1kRzfp6GaQdIaWBGswTPkg:Krx33OukZlpF32FVvGalh6GaQeGT9
File Content Preview:MZ..............@.......@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_...............G.....X.......h............@.................................C......................................

File Icon

Icon Hash:da9aa9a256abcb65

Static PE Info

General

Entrypoint:0x476800
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x5FC88CBA [Thu Dec 3 06:59:06 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:1
OS Version Minor:0
File Version Major:1
File Version Minor:0
Subsystem Version Major:1
Subsystem Version Minor:0
Import Hash:

Entrypoint Preview

Instruction
call 00007FA85C74A155h
pop edx
sub edx, 06h
push edx
mov ebx, dword ptr fs:[00000030h]
mov ebx, dword ptr [ebx+0Ch]
mov ebx, dword ptr [ebx+0Ch]
mov ebx, dword ptr [ebx]
or ebx, ebx
or ebx, ebx
mov ebx, dword ptr [ebx]
xchg ecx, ecx
mov eax, dword ptr [ebx+18h]
and ecx, ecx
mov dword ptr [ebp-04h], eax
mov eax, dword ptr [eax+3Ch]
add eax, dword ptr [ebp-04h]
mov eax, dword ptr [eax+78h]
add eax, dword ptr [ebp-04h]
or ecx, ecx
or ecx, ecx
and eax, eax
mov ebx, dword ptr [eax+20h]
xchg edx, edx
add ebx, dword ptr [ebp-04h]
xchg ecx, ecx
mov ecx, dword ptr [eax+1Ch]
xchg ebx, ebx
nop
xchg edx, edx
and ecx, ecx
add ecx, dword ptr [ebp-04h]
mov edx, dword ptr [eax+24h]
and ecx, ecx
and ebx, FFFFFFFFh
xchg ebx, ebx
or ecx, ecx
add edx, dword ptr [ebp-04h]
xchg ebx, ebx
xchg ecx, ecx
push ecx
mov esi, dword ptr [ebx]
add esi, dword ptr [ebp-04h]
and edx, edx
push edx
xchg ebx, ebx
nop
or ebx, ebx
or ebx, ebx
and ecx, ecx
push esi
and ecx, ecx
and edx, edx
and ecx, ecx
and edx, FFFFFFFFh
and ebx, ebx
call 00007FA85C74A20Ah
and edx, edx
pop edx
cmp eax, 0038D13Ch
je 00007FA85C74A163h
add ebx, 04h
or ecx, ecx
add edx, 02h
jmp 00007FA85C74A118h
pop ecx
xchg ebx, ebx
xchg edx, edx
and ebx, FFFFFFFFh
xchg ecx, ecx
xor ebx, ebx
and ecx, ecx
mov bx, word ptr [edx]
or ecx, ecx
imul ebx, ebx, 04h
mov eax, dword ptr [ecx+ebx]
and ebx, ebx
and eax, eax
add eax, dword ptr [ebp-04h]
or ecx, ecx
pop edx
and ebx, 00000000h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x930000xadae.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x759ae0x75a00False0.269228214665PE32 executable (GUI) Intel 80386, for MS Windows4.2724741752IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x770000x7b80x800False0.625data5.68691760105IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x780000x195f60x19600False0.956877309113data7.91626604629IMAGE_SCN_MEM_READ
.tls0x920000x7c0x200False0.064453125data0.199775656087IMAGE_SCN_MEM_READ
.rsrc0x930000xadae0xae00False0.539691091954data3.81210794401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x931a40x568GLS_BINARY_LSB_FIRST
RT_ICON0x9370c0x8a8data
RT_ICON0x93fb40xea8data
RT_ICON0x94e5c0x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 0
RT_ICON0x964840x2ca8data
RT_ICON0x9912c0x4c28dBase IV DBT, blocks size 0, block length 18432, next free block index 40, next free block 4241346293, next used block 1034317822
RT_GROUP_ICON0x9dd540x5adata

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Dec 3, 2020 09:58:33.007957935 CET5406453192.168.2.68.8.8.8
Dec 3, 2020 09:58:33.035159111 CET53540648.8.8.8192.168.2.6
Dec 3, 2020 09:58:33.813399076 CET5281153192.168.2.68.8.8.8
Dec 3, 2020 09:58:33.840426922 CET53528118.8.8.8192.168.2.6
Dec 3, 2020 09:58:34.622200966 CET5529953192.168.2.68.8.8.8
Dec 3, 2020 09:58:34.658046007 CET53552998.8.8.8192.168.2.6
Dec 3, 2020 09:58:42.543369055 CET6374553192.168.2.68.8.8.8
Dec 3, 2020 09:58:42.570534945 CET53637458.8.8.8192.168.2.6
Dec 3, 2020 09:58:43.717699051 CET5005553192.168.2.68.8.8.8
Dec 3, 2020 09:58:43.744678020 CET53500558.8.8.8192.168.2.6
Dec 3, 2020 09:58:44.712975979 CET6137453192.168.2.68.8.8.8
Dec 3, 2020 09:58:44.740035057 CET53613748.8.8.8192.168.2.6
Dec 3, 2020 09:58:45.236205101 CET5033953192.168.2.68.8.8.8
Dec 3, 2020 09:58:45.263329983 CET53503398.8.8.8192.168.2.6
Dec 3, 2020 09:59:00.758932114 CET6330753192.168.2.68.8.8.8
Dec 3, 2020 09:59:00.785965919 CET53633078.8.8.8192.168.2.6
Dec 3, 2020 09:59:17.639456034 CET4969453192.168.2.68.8.8.8
Dec 3, 2020 09:59:17.666378975 CET53496948.8.8.8192.168.2.6
Dec 3, 2020 09:59:20.061356068 CET5498253192.168.2.68.8.8.8
Dec 3, 2020 09:59:20.088129997 CET53549828.8.8.8192.168.2.6
Dec 3, 2020 09:59:20.603008032 CET5001053192.168.2.68.8.8.8
Dec 3, 2020 09:59:20.655071020 CET53500108.8.8.8192.168.2.6
Dec 3, 2020 09:59:21.244880915 CET6371853192.168.2.68.8.8.8
Dec 3, 2020 09:59:21.280440092 CET53637188.8.8.8192.168.2.6
Dec 3, 2020 09:59:21.378500938 CET6211653192.168.2.68.8.8.8
Dec 3, 2020 09:59:21.405493975 CET53621168.8.8.8192.168.2.6
Dec 3, 2020 09:59:21.691581011 CET6381653192.168.2.68.8.8.8
Dec 3, 2020 09:59:21.779614925 CET53638168.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.071378946 CET5501453192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.107191086 CET53550148.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.465591908 CET6220853192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.477787018 CET5757453192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.501205921 CET53622088.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.505228996 CET53575748.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.727617025 CET5181853192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.763194084 CET53518188.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.780606031 CET5662853192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.817647934 CET53566288.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.882082939 CET6077853192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.917150974 CET53607788.8.8.8192.168.2.6
Dec 3, 2020 09:59:22.960058928 CET5379953192.168.2.68.8.8.8
Dec 3, 2020 09:59:22.997616053 CET53537998.8.8.8192.168.2.6
Dec 3, 2020 09:59:23.452016115 CET5468353192.168.2.68.8.8.8
Dec 3, 2020 09:59:23.487421989 CET53546838.8.8.8192.168.2.6
Dec 3, 2020 09:59:24.733033895 CET5932953192.168.2.68.8.8.8
Dec 3, 2020 09:59:24.768492937 CET53593298.8.8.8192.168.2.6
Dec 3, 2020 09:59:25.380677938 CET6402153192.168.2.68.8.8.8
Dec 3, 2020 09:59:25.407536030 CET53640218.8.8.8192.168.2.6
Dec 3, 2020 09:59:26.140074968 CET5612953192.168.2.68.8.8.8
Dec 3, 2020 09:59:26.175757885 CET53561298.8.8.8192.168.2.6
Dec 3, 2020 09:59:29.513184071 CET5817753192.168.2.68.8.8.8
Dec 3, 2020 09:59:29.550185919 CET53581778.8.8.8192.168.2.6
Dec 3, 2020 10:00:00.666518927 CET5070053192.168.2.68.8.8.8
Dec 3, 2020 10:00:00.693614960 CET53507008.8.8.8192.168.2.6
Dec 3, 2020 10:00:00.959947109 CET5406953192.168.2.68.8.8.8
Dec 3, 2020 10:00:01.004128933 CET53540698.8.8.8192.168.2.6
Dec 3, 2020 10:00:07.371217966 CET6117853192.168.2.68.8.8.8
Dec 3, 2020 10:00:07.408102989 CET53611788.8.8.8192.168.2.6
Dec 3, 2020 10:00:24.997495890 CET5701753192.168.2.68.8.8.8
Dec 3, 2020 10:00:25.024599075 CET53570178.8.8.8192.168.2.6

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:09:58:39
Start date:03/12/2020
Path:C:\Users\user\Desktop\Bank Swift.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\Bank Swift.exe'
Imagebase:0x400000
File size:633856 bytes
MD5 hash:2ACE5C4532C77C014A02CC027D725D83
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:09:58:40
Start date:03/12/2020
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7028 -s 216
Imagebase:0xd90000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >