Resubmissions

20/02/2024, 10:01

240220-l2lm6sfc97 3

Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 10:01

General

  • Target

    Galaxy-Swapper-v2-main/Workspace/Usercontrols/LoginView.xaml.cs

  • Size

    3KB

  • MD5

    3db88e9c724be878cb810f0fa6cd4ae3

  • SHA1

    e362418bc7dd4f540bb76d857559703431df6574

  • SHA256

    a6b9292ef758375bc084838eb997e785b7f08495e63d79dc8f9765ff7188b38e

  • SHA512

    c497a0cf81b9ae22622d8fac0b2ec140f6d247f79d38351973849be88b4cea94d9ed88596ea043b5e134af86c30ef62ef581fad6b3d047336a0e2f34d3d4dd33

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Galaxy-Swapper-v2-main\Workspace\Usercontrols\LoginView.xaml.cs
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Galaxy-Swapper-v2-main\Workspace\Usercontrols\LoginView.xaml.cs"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          03dfd49aa560c196e5f2d75be94f7e34

          SHA1

          d6519a59465c24463053bf3a4341d1dc129a4a8d

          SHA256

          a5546e07765b259f1cd9370bcacb7b8b75085308a5fa5fe31e0c03c5283e5ffd

          SHA512

          1dfecfae8a54c587f148df05c5513e5631ef3d88d3a1c1b05eb879598a8ef88392a8e0e8499cf2915b2fadc2eb39a68e53c77c3a007c31ef2c3a3da6cdee27e7