Loading ...

Play interactive tourEdit tour

Analysis Report Bank Swift.exe

Overview

General Information

Sample Name:Bank Swift.exe
Analysis ID:326331
MD5:2ace5c4532c77c014a02cc027d725d83
SHA1:c5d7fd7b905ec976af21fb78f7fbbb516767da2f
SHA256:53ae2502a9fed69821959a54927023f131c6e62ebc46119d86e2eaad60356827
Tags:exe

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Machine Learning detection for sample
PE file has a writeable .text section
Checks if the current process is being debugged
Creates a DirectInput object (often for capturing keystrokes)
Enables debug privileges
One or more processes crash
PE file contains strange resources
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Stores large binary data to the registry
Tries to load missing DLLs

Classification

Startup

  • System is w10x64
  • Bank Swift.exe (PID: 4696 cmdline: 'C:\Users\user\Desktop\Bank Swift.exe' MD5: 2ACE5C4532C77C014A02CC027D725D83)
    • WerFault.exe (PID: 5488 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 216 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: Bank Swift.exeJoe Sandbox ML: detected
Source: unknownDNS traffic detected: queries for: g.msn.com
Source: Bank Swift.exe, 00000000.00000002.326572025.000000000074A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

System Summary:

barindex
PE file has a writeable .text sectionShow sources
Source: Bank Swift.exeStatic PE information: Section: .text IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 216
Source: Bank Swift.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Bank Swift.exeStatic PE information: No import functions for PE file found
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: phoneinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: ext-ms-win-xblauth-console-l1.dllJump to behavior
Source: classification engineClassification label: mal48.winEXE@2/4@2/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4696
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER4998.tmpJump to behavior
Source: C:\Users\user\Desktop\Bank Swift.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Bank Swift.exe 'C:\Users\user\Desktop\Bank Swift.exe'
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 216
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.247353415.0000000000806000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.247395897.000000000080C000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.247395897.000000000080C000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.247388259.0000000000800000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.247353415.0000000000806000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.248441590.0000000004A11000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 00000003.00000003.248441590.0000000004A11000.00000004.00000001.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.247388259.0000000000800000.00000004.00000001.sdmp
Source: C:\Windows\SysWOW64\WerFault.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363} DeviceTicketJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: PhysicalDrive0Jump to behavior
Source: WerFault.exe, 00000003.00000002.325471501.0000000004B00000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000003.00000003.255617815.0000000000813000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: WerFault.exe, 00000003.00000002.325471501.0000000004B00000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000003.00000002.325471501.0000000004B00000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000003.00000003.323211758.00000000007DA000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW)1
Source: WerFault.exe, 00000003.00000003.254391786.0000000000813000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: WerFault.exe, 00000003.00000002.325471501.0000000004B00000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\SysWOW64\WerFault.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Bank Swift.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess token adjusted: DebugJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection1Modify Registry1Input Capture1Security Software Discovery21Remote ServicesInput Capture1Exfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSSystem Information Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 326331 Sample: Bank Swift.exe Startdate: 03/12/2020 Architecture: WINDOWS Score: 48 14 g.msn.com 2->14 16 Machine Learning detection for sample 2->16 18 PE file has a writeable .text section 2->18 7 Bank Swift.exe 2->7         started        signatures3 process4 process5 9 WerFault.exe 23 9 7->9         started        file6 12 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->12 dropped

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Bank Swift.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
g.msn.com
unknown
unknownfalse
    high

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:31.0.0 Red Diamond
    Analysis ID:326331
    Start date:03.12.2020
    Start time:10:03:06
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 19s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Bank Swift.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:25
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal48.winEXE@2/4@2/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 52.255.188.83, 92.122.144.200, 168.61.161.212, 51.104.139.180, 13.64.90.137, 52.155.217.156, 2.20.142.210, 2.20.142.209, 51.103.5.159, 20.54.26.129, 104.43.193.48, 52.142.114.176, 92.122.213.194, 92.122.213.247, 40.88.32.150, 104.43.139.144
    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, skypedataprdcoleus15.cloudapp.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Bank Swift.exe_80879c17d1924b75c27e84dfcffed9edc11fd3_314a8f1f_1523d379\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):7398
    Entropy (8bit):3.7636306181480026
    Encrypted:false
    SSDEEP:96:ugTdVUZA4Eh8O75f0pXIQcQvc6QcEDMcw3Dpe6+HbHg6ZAXGng5FMTPSkvPkpXmd:jTvUZA4HBUZMXAjE/u7suS274It5X
    MD5:EA65043C65221DFAA6535B5E5C8D4A46
    SHA1:5B7485476F7851722DC00FF87FF426F8E2D095AC
    SHA-256:C823265D545749F44003CC1D426F0375DA2DB31B8B2EEAD56A16152FD71BBFA8
    SHA-512:812B0493EB9CE655FDE3267185DFF7FD2517A03659936DDB2AF70C7949B4CF08306A98BC91E80F6952B529FA639BCC23C0D7EA21584A4B84F66A5F612B55B885
    Malicious:true
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.1.4.9.2.2.4.4.5.9.5.5.9.0.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.1.4.9.2.2.4.7.2.5.1.8.3.7.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.9.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.b.d.0.a.4.9.b.-.b.7.1.7.-.4.8.6.0.-.8.9.4.8.-.e.b.d.d.8.8.4.c.0.7.e.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.b.4.c.d.b.a.-.d.a.f.a.-.4.4.b.f.-.b.7.d.6.-.c.1.9.b.7.9.e.5.e.b.5.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.B.a.n.k. .S.w.i.f.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.5.8.-.0.0.0.1.-.0.0.1.7.-.c.6.9.a.-.2.3.a.e.9.e.c.9.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.2.3.e.3.2.9.6.1.5.b.b.0.9.0.9.4.8.8.b.5.c.7.2.f.3.2.a.1.5.e.5.0.0.0.0.f.f.f.f.!.0.0.0.0.c.5.d.7.f.d.7.b.9.0.5.e.c.9.7.6.a.f.2.1.f.b.7.8.f.7.f.b.b.b.5.1.6.7.6.7.d.a.2.f.!.B.a.n.k. .S.w.i.f.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER4998.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Thu Dec 3 18:04:04 2020, 0x1205a4 type
    Category:dropped
    Size (bytes):18256
    Entropy (8bit):2.1674567117949786
    Encrypted:false
    SSDEEP:96:5cN8Q/dMR0cTm0LVosbHU1IbNhMiXpCdt12fylWInWIX4I4/560nnGA:sGacKZ1CvMMCdMyK/MsnGA
    MD5:13F1799F03A7AC23B94D4A5BF4B5DA79
    SHA1:5411C2FD439B32289C5C5F098B3F4F7B9EB633F0
    SHA-256:C2450E30D3F812B94D5D9EDF74CC8E9063305258925B33212ADF7A21680678B9
    SHA-512:90586ED4E7DC04A40FCD2FE238B75511C6C06FCA0FFA136DE71D1CD68A43AD014DBA96F9D02A6CBF3622866046EA600CEF0A922C3349AE55B74210391C182BCB
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........(._...................U...........B..............GenuineIntelW...........T.......X....(._.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER4AF0.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8284
    Entropy (8bit):3.696183479397755
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiVHL6TJ/9fC6YghSUZm2gmfXSQCprJ89bCngsf02m:RrlsNi9L699fC6YGSUZm2gmfXSOCnzf8
    MD5:1E3244F8DED4DEFD69A9D28898100BB1
    SHA1:55C50AE05E7F994FDC542F07616FFD6EF1C7C49A
    SHA-256:F2B6ED1C8EEF0BEDFFA701EBCAACC0F33CBA5E8E95FBCB0D6881E4986868FBFA
    SHA-512:7D7628E5765066C62EBD10D2249AD8217D331AF25715834773B2CC9BB9D7A41578565F6E4734412B5DCDD7172F4E19166C5B25B5797C76BC78E4A5DFC5C7B78D
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.6.9.6.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER4CB7.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4566
    Entropy (8bit):4.449454483084036
    Encrypted:false
    SSDEEP:48:cvIwSD8zs2JgtWI9DjWSC8B18fm8M4JpYFa/V+q8QuYoJkwv6wLd:uITfMkSSNoJRVYYoOwv6wLd
    MD5:B2F80A7136344658E844048CED2DB972
    SHA1:1D1B6AE6734B2C4E02769F85D76EC81261ED0485
    SHA-256:617DD1B8B5152EC8682E17B28D583C07268A5C2E717C9051983F31D52095DF02
    SHA-512:29BFE8B3D4A28C0956F7D95D52ED4E8E389957AB71F3DCA353BEA66DDE5A7B367CAB8821C331A331F93F4BEA7AE71C56574F155300848045F9FC2EC348AA87A9
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="756194" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):5.306275307055633
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • VXD Driver (31/22) 0.00%
    File name:Bank Swift.exe
    File size:633856
    MD5:2ace5c4532c77c014a02cc027d725d83
    SHA1:c5d7fd7b905ec976af21fb78f7fbbb516767da2f
    SHA256:53ae2502a9fed69821959a54927023f131c6e62ebc46119d86e2eaad60356827
    SHA512:0ea190a125f3c27c8ed6feb6533ec8904cf34faef62517fa3f70e528bbc21870637bef7236360f46e53e7cbeaf8cd5b646416c1029901dc150684ecd46a9457f
    SSDEEP:6144:Kd9vx8vk3Ouk2wlpF3W/FVvG1kRzfp6GaQdIaWBGswTPkg:Krx33OukZlpF32FVvGalh6GaQeGT9
    File Content Preview:MZ..............@.......@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_...............G.....X.......h............@.................................C......................................

    File Icon

    Icon Hash:da9aa9a256abcb65

    Static PE Info

    General

    Entrypoint:0x476800
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x5FC88CBA [Thu Dec 3 06:59:06 2020 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:1
    OS Version Minor:0
    File Version Major:1
    File Version Minor:0
    Subsystem Version Major:1
    Subsystem Version Minor:0
    Import Hash:

    Entrypoint Preview

    Instruction
    call 00007F9DF4AD2EA5h
    pop edx
    sub edx, 06h
    push edx
    mov ebx, dword ptr fs:[00000030h]
    mov ebx, dword ptr [ebx+0Ch]
    mov ebx, dword ptr [ebx+0Ch]
    mov ebx, dword ptr [ebx]
    or ebx, ebx
    or ebx, ebx
    mov ebx, dword ptr [ebx]
    xchg ecx, ecx
    mov eax, dword ptr [ebx+18h]
    and ecx, ecx
    mov dword ptr [ebp-04h], eax
    mov eax, dword ptr [eax+3Ch]
    add eax, dword ptr [ebp-04h]
    mov eax, dword ptr [eax+78h]
    add eax, dword ptr [ebp-04h]
    or ecx, ecx
    or ecx, ecx
    and eax, eax
    mov ebx, dword ptr [eax+20h]
    xchg edx, edx
    add ebx, dword ptr [ebp-04h]
    xchg ecx, ecx
    mov ecx, dword ptr [eax+1Ch]
    xchg ebx, ebx
    nop
    xchg edx, edx
    and ecx, ecx
    add ecx, dword ptr [ebp-04h]
    mov edx, dword ptr [eax+24h]
    and ecx, ecx
    and ebx, FFFFFFFFh
    xchg ebx, ebx
    or ecx, ecx
    add edx, dword ptr [ebp-04h]
    xchg ebx, ebx
    xchg ecx, ecx
    push ecx
    mov esi, dword ptr [ebx]
    add esi, dword ptr [ebp-04h]
    and edx, edx
    push edx
    xchg ebx, ebx
    nop
    or ebx, ebx
    or ebx, ebx
    and ecx, ecx
    push esi
    and ecx, ecx
    and edx, edx
    and ecx, ecx
    and edx, FFFFFFFFh
    and ebx, ebx
    call 00007F9DF4AD2F5Ah
    and edx, edx
    pop edx
    cmp eax, 0038D13Ch
    je 00007F9DF4AD2EB3h
    add ebx, 04h
    or ecx, ecx
    add edx, 02h
    jmp 00007F9DF4AD2E68h
    pop ecx
    xchg ebx, ebx
    xchg edx, edx
    and ebx, FFFFFFFFh
    xchg ecx, ecx
    xor ebx, ebx
    and ecx, ecx
    mov bx, word ptr [edx]
    or ecx, ecx
    imul ebx, ebx, 04h
    mov eax, dword ptr [ecx+ebx]
    and ebx, ebx
    and eax, eax
    add eax, dword ptr [ebp-04h]
    or ecx, ecx
    pop edx
    and ebx, 00000000h

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x930000xadae.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x759ae0x75a00False0.269228214665PE32 executable (GUI) Intel 80386, for MS Windows4.2724741752IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x770000x7b80x800False0.625data5.68691760105IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x780000x195f60x19600False0.956877309113data7.91626604629IMAGE_SCN_MEM_READ
    .tls0x920000x7c0x200False0.064453125data0.199775656087IMAGE_SCN_MEM_READ
    .rsrc0x930000xadae0xae00False0.539691091954data3.81210794401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x931a40x568GLS_BINARY_LSB_FIRST
    RT_ICON0x9370c0x8a8data
    RT_ICON0x93fb40xea8data
    RT_ICON0x94e5c0x1628dBase IV DBT of \200.DBF, blocks size 0, block length 4608, next free block index 40, next free block 0, next used block 0
    RT_ICON0x964840x2ca8data
    RT_ICON0x9912c0x4c28dBase IV DBT, blocks size 0, block length 18432, next free block index 40, next free block 4241346293, next used block 1034317822
    RT_GROUP_ICON0x9dd540x5adata

    Network Behavior

    Network Port Distribution

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Dec 3, 2020 10:04:08.625196934 CET6366853192.168.2.78.8.8.8
    Dec 3, 2020 10:04:08.652194023 CET53636688.8.8.8192.168.2.7
    Dec 3, 2020 10:04:13.168123960 CET5464053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:13.205226898 CET53546408.8.8.8192.168.2.7
    Dec 3, 2020 10:04:17.266319036 CET5873953192.168.2.78.8.8.8
    Dec 3, 2020 10:04:17.293328047 CET53587398.8.8.8192.168.2.7
    Dec 3, 2020 10:04:18.707664967 CET6033853192.168.2.78.8.8.8
    Dec 3, 2020 10:04:18.735018969 CET53603388.8.8.8192.168.2.7
    Dec 3, 2020 10:04:22.992645025 CET5871753192.168.2.78.8.8.8
    Dec 3, 2020 10:04:23.020464897 CET53587178.8.8.8192.168.2.7
    Dec 3, 2020 10:04:28.586172104 CET5976253192.168.2.78.8.8.8
    Dec 3, 2020 10:04:28.613363028 CET53597628.8.8.8192.168.2.7
    Dec 3, 2020 10:04:29.329097986 CET5432953192.168.2.78.8.8.8
    Dec 3, 2020 10:04:29.356168032 CET53543298.8.8.8192.168.2.7
    Dec 3, 2020 10:04:35.951611042 CET5805253192.168.2.78.8.8.8
    Dec 3, 2020 10:04:35.978822947 CET53580528.8.8.8192.168.2.7
    Dec 3, 2020 10:04:39.566442013 CET5400853192.168.2.78.8.8.8
    Dec 3, 2020 10:04:39.593497992 CET53540088.8.8.8192.168.2.7
    Dec 3, 2020 10:04:40.637523890 CET5945153192.168.2.78.8.8.8
    Dec 3, 2020 10:04:40.673032045 CET53594518.8.8.8192.168.2.7
    Dec 3, 2020 10:04:43.653302908 CET5291453192.168.2.78.8.8.8
    Dec 3, 2020 10:04:43.692128897 CET53529148.8.8.8192.168.2.7
    Dec 3, 2020 10:04:44.109178066 CET6456953192.168.2.78.8.8.8
    Dec 3, 2020 10:04:44.146260977 CET53645698.8.8.8192.168.2.7
    Dec 3, 2020 10:04:44.784944057 CET5281653192.168.2.78.8.8.8
    Dec 3, 2020 10:04:44.820770979 CET53528168.8.8.8192.168.2.7
    Dec 3, 2020 10:04:45.171366930 CET5078153192.168.2.78.8.8.8
    Dec 3, 2020 10:04:45.181185007 CET5423053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:45.218492985 CET53507818.8.8.8192.168.2.7
    Dec 3, 2020 10:04:45.224344969 CET53542308.8.8.8192.168.2.7
    Dec 3, 2020 10:04:45.326652050 CET5491153192.168.2.78.8.8.8
    Dec 3, 2020 10:04:45.329180002 CET4995853192.168.2.78.8.8.8
    Dec 3, 2020 10:04:45.356254101 CET53499588.8.8.8192.168.2.7
    Dec 3, 2020 10:04:45.389111996 CET53549118.8.8.8192.168.2.7
    Dec 3, 2020 10:04:45.674350977 CET5086053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:45.709924936 CET53508608.8.8.8192.168.2.7
    Dec 3, 2020 10:04:46.030839920 CET5045253192.168.2.78.8.8.8
    Dec 3, 2020 10:04:46.066523075 CET53504528.8.8.8192.168.2.7
    Dec 3, 2020 10:04:46.144993067 CET5973053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:46.172111988 CET53597308.8.8.8192.168.2.7
    Dec 3, 2020 10:04:46.488519907 CET5931053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:46.524024963 CET53593108.8.8.8192.168.2.7
    Dec 3, 2020 10:04:46.918834925 CET5191953192.168.2.78.8.8.8
    Dec 3, 2020 10:04:46.956573009 CET53519198.8.8.8192.168.2.7
    Dec 3, 2020 10:04:46.981966972 CET6429653192.168.2.78.8.8.8
    Dec 3, 2020 10:04:47.009016037 CET53642968.8.8.8192.168.2.7
    Dec 3, 2020 10:04:47.466274023 CET5668053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:47.501998901 CET53566808.8.8.8192.168.2.7
    Dec 3, 2020 10:04:48.972369909 CET5882053192.168.2.78.8.8.8
    Dec 3, 2020 10:04:49.009903908 CET53588208.8.8.8192.168.2.7
    Dec 3, 2020 10:04:49.044904947 CET6098353192.168.2.78.8.8.8
    Dec 3, 2020 10:04:49.088216066 CET53609838.8.8.8192.168.2.7
    Dec 3, 2020 10:04:49.309803009 CET4924753192.168.2.78.8.8.8
    Dec 3, 2020 10:04:49.345410109 CET53492478.8.8.8192.168.2.7
    Dec 3, 2020 10:04:50.053294897 CET5228653192.168.2.78.8.8.8
    Dec 3, 2020 10:04:50.090537071 CET53522868.8.8.8192.168.2.7
    Dec 3, 2020 10:04:55.808554888 CET5606453192.168.2.78.8.8.8
    Dec 3, 2020 10:04:55.835467100 CET53560648.8.8.8192.168.2.7
    Dec 3, 2020 10:05:22.780018091 CET6374453192.168.2.78.8.8.8
    Dec 3, 2020 10:05:22.807009935 CET53637448.8.8.8192.168.2.7
    Dec 3, 2020 10:05:23.704996109 CET6145753192.168.2.78.8.8.8
    Dec 3, 2020 10:05:23.732042074 CET53614578.8.8.8192.168.2.7
    Dec 3, 2020 10:05:24.760817051 CET5836753192.168.2.78.8.8.8
    Dec 3, 2020 10:05:24.787975073 CET53583678.8.8.8192.168.2.7
    Dec 3, 2020 10:05:30.674300909 CET6059953192.168.2.78.8.8.8
    Dec 3, 2020 10:05:30.709754944 CET53605998.8.8.8192.168.2.7
    Dec 3, 2020 10:05:46.124448061 CET5957153192.168.2.78.8.8.8
    Dec 3, 2020 10:05:46.151633978 CET53595718.8.8.8192.168.2.7
    Dec 3, 2020 10:06:04.914928913 CET5268953192.168.2.78.8.8.8
    Dec 3, 2020 10:06:04.942213058 CET53526898.8.8.8192.168.2.7
    Dec 3, 2020 10:06:05.969528913 CET5029053192.168.2.78.8.8.8
    Dec 3, 2020 10:06:05.996619940 CET53502908.8.8.8192.168.2.7
    Dec 3, 2020 10:06:06.996464014 CET6042753192.168.2.78.8.8.8
    Dec 3, 2020 10:06:07.023490906 CET53604278.8.8.8192.168.2.7
    Dec 3, 2020 10:06:08.659492970 CET5620953192.168.2.78.8.8.8
    Dec 3, 2020 10:06:08.686654091 CET53562098.8.8.8192.168.2.7
    Dec 3, 2020 10:06:20.293653965 CET5958253192.168.2.78.8.8.8
    Dec 3, 2020 10:06:20.337250948 CET53595828.8.8.8192.168.2.7
    Dec 3, 2020 10:06:40.923434973 CET6094953192.168.2.78.8.8.8
    Dec 3, 2020 10:06:40.950665951 CET53609498.8.8.8192.168.2.7
    Dec 3, 2020 10:06:59.313481092 CET5854253192.168.2.78.8.8.8
    Dec 3, 2020 10:06:59.341099977 CET53585428.8.8.8192.168.2.7
    Dec 3, 2020 10:07:01.128875017 CET5917953192.168.2.78.8.8.8
    Dec 3, 2020 10:07:01.155968904 CET53591798.8.8.8192.168.2.7
    Dec 3, 2020 10:07:05.642198086 CET6092753192.168.2.78.8.8.8
    Dec 3, 2020 10:07:05.679966927 CET53609278.8.8.8192.168.2.7
    Dec 3, 2020 10:07:06.465666056 CET5785453192.168.2.78.8.8.8
    Dec 3, 2020 10:07:06.492929935 CET53578548.8.8.8192.168.2.7
    Dec 3, 2020 10:07:07.301096916 CET6202653192.168.2.78.8.8.8
    Dec 3, 2020 10:07:07.328151941 CET53620268.8.8.8192.168.2.7

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Dec 3, 2020 10:04:49.044904947 CET192.168.2.78.8.8.80xed73Standard query (0)g.msn.comA (IP address)IN (0x0001)
    Dec 3, 2020 10:06:20.293653965 CET192.168.2.78.8.8.80x541eStandard query (0)g.msn.comA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Dec 3, 2020 10:04:49.088216066 CET8.8.8.8192.168.2.70xed73No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
    Dec 3, 2020 10:06:20.337250948 CET8.8.8.8192.168.2.70x541eNo error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:10:04:01
    Start date:03/12/2020
    Path:C:\Users\user\Desktop\Bank Swift.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\Bank Swift.exe'
    Imagebase:0x400000
    File size:633856 bytes
    MD5 hash:2ACE5C4532C77C014A02CC027D725D83
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:10:04:03
    Start date:03/12/2020
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 216
    Imagebase:0xdf0000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >