Analysis

  • max time kernel
    76s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/09/2022, 22:01

General

  • Target

    Galaxy Swapper v2.exe

  • Size

    2.8MB

  • MD5

    db7399a2f5dc863ed92ad4a830c6780f

  • SHA1

    46cbbef7a9874f5f522ba17c78d4052c96ebf4f4

  • SHA256

    d3f76b9a92be38050edb117f0923930408f8e99a3f42757669482dbaade784fe

  • SHA512

    5aa32464129b1b1d49d807ad269feece2bf576455a9abe72b8f87cfb77aaaa607e6ca86496a2528a3b7bf26bc24acbd2cdb255db16ab811ade69358b77913b37

  • SSDEEP

    49152:Lagsw486ZKHmkamySaWSglJ4tUTi5tuw8q+mc7iAyoOB7jI:gB8vH7ctUTsujeO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=5.0.17&gui=true
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    083157c020a1f2f2d4776d2be95a5b56

    SHA1

    7c321559cdc9fd21b72ca003907311ccb56b8a01

    SHA256

    744354dfb57a017d2a9f14c4d0cffe1a71d88ca595c2748e33faab211b4b63c6

    SHA512

    05daf2be33b85735967990db10fc822bc07c9f0a0d6b37ca57527e5af506168250f6dd74850da11a37bfd4e778417b8b1e5e9b3a1177d52eb4538d3c89363b32

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XQP5XMU6.txt

    Filesize

    605B

    MD5

    10925e02d678e7638e514b572a8453b6

    SHA1

    2596e424d4770f9f9fc33db09bb2f5558a005e94

    SHA256

    2d17e517f2033751fbc9676265cb0cca56bf898c15f6327ca24768746f445bf8

    SHA512

    b483fd0b6635400294adc9fef8c23df900d507a0b43d552d676311e67101b6898680381a1b4b38f1457b16e187884401784efbedf0d3214eb4d0bf22aae80932

  • memory/576-54-0x000007FEFBF01000-0x000007FEFBF03000-memory.dmp

    Filesize

    8KB