Analysis
-
max time kernel
9s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
Galaxy_Swapper_v2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Galaxy_Swapper_v2.exe
Resource
win10v2004-20240221-en
General
-
Target
Galaxy_Swapper_v2.exe
-
Size
4.7MB
-
MD5
3b342bccddd3b9e2444a643bd42ebc71
-
SHA1
e9aa3efd4d3f0a135cb5c304e9edd0555f539c1f
-
SHA256
28102319adcc684a1f3c85fd4953b21b8b0b0433e35a4f01feea01d6379506d5
-
SHA512
f925db08cab152d841c9601b900b2804d489b254f574c6f0124e4f41d7f26f209c7b103f2606710370a0af89e94aaf421c96aa31bf1ae552146abf0ccdf58d2e
-
SSDEEP
98304:TNAlj2vL5CHSHlyFGvFomw3/49sOjNjTUJECByxW5B9ch12dlv+s+SbRSuYPjlFd:TxhsqYgRNcagIeD4uy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C82EDC1-D2BC-11EE-AAA1-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1436 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1436 iexplore.exe 1436 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1436 2036 Galaxy_Swapper_v2.exe 28 PID 2036 wrote to memory of 1436 2036 Galaxy_Swapper_v2.exe 28 PID 2036 wrote to memory of 1436 2036 Galaxy_Swapper_v2.exe 28 PID 1436 wrote to memory of 2592 1436 iexplore.exe 30 PID 1436 wrote to memory of 2592 1436 iexplore.exe 30 PID 1436 wrote to memory of 2592 1436 iexplore.exe 30 PID 1436 wrote to memory of 2592 1436 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Galaxy_Swapper_v2.exe"C:\Users\Admin\AppData\Local\Temp\Galaxy_Swapper_v2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=7.0.14&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534bfc6dabdb8ac232d8402da2437e55e
SHA13f857e3eccd8e3daad9f8b64eb1696ee740dcf22
SHA2565caee72222971abf8dd90cfafefa5e20b8e0394d045225cda51ccfba525ce7d2
SHA512447d19bc46965d6e37797b75a4c7ac40248dd5116153ef060cecbb249e1f7532a050ada7ae6ea792cc6e7f61a6d94f9ab833f645d4c9acdeb2bf53d5033501ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45baaccdaf0f9fe10f9ee123dc55cf1
SHA1427b0e823c92ec1b436634482614c7be5cb90b95
SHA25620a6b1921d3204cd450b153d2a1afc52af6a7afd4875fb71e758a3a6b7518522
SHA51209217f859c639c23a71c26792432c4cc7a200d679ed6dd22dc80177402dede1e39a53b3b42b421a269c733c80a8821d3911482dae72a48f7b0b342f45e9a4505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d31a88ffc82f7775e73e8b37c067e2a
SHA12045092dcddcd54367d6870d413f9cd20bbb3f88
SHA2562f152340bdbeeb5b7ee7462f834546b533e6b681185ed8c71a26230523421a47
SHA5122d67754152191474b857d3d925e2991dcd93731e32fab0e099fa168483c68749e720b1065d97d6c152783e5883401ce0a24dcd7ef3f7fc2ffb932d6593b7f37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d37d9131f5b48a3fcdccd189d8bb6b4
SHA17083a36093b180a38127614797423c5dae89a07b
SHA2562d6bd0f51a07ebcdff38a2316f9143930a1c55d9c057a1d5a323e307c87ea90f
SHA51254d6c6d964fb215d2a5dd5a17ce2cdd2ad92d7810286f69def259418d2204fa04742ac067e3f6bd93dccbcc2bc390a92000dd9caebb13d6264a4ad13a82e6783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510a8f00a5b70f3cabd8eae7d1b9cdba4
SHA1502e19056c88e0e2fc2065d35d1f4dfe34d17c35
SHA2563897f6ac17f88d0a238ceca60df884236c9c3d67139e9df21546be48048ad4a4
SHA512150fb767476e25f6dc91d61a295e85fdd69605d6f3fe95848a7cf30c6ca80c97eb617cd1ef89e3a02ac0cbe9034e4d688d8d29539b198a475498187c8030cfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db5d7fda1821c394d885b1f1e5108a07
SHA1a4f6c079e006591cf2c8520b9d957ce946bd6772
SHA256a0cdadcd82fb1ea94f57328ebb0373fc48a00d57bc89ec101b8e96e2f547f31d
SHA51226224377c26ebfb9ae33bb91125db4f19875c416a0a91c97aae14a0ff814c50d31bc682c3eab04d6534982c8e68d9307e6d5735d83c6f2e43f6993e2521e8d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f776a4c354e43abbe772100d02c9964c
SHA1c7e13e3f9cf4048c02dd89a65f13659b83d03354
SHA256d9535437b17c8f8a263df3a5edeb15f6bfed92ef95118905510ed27b2fdd1902
SHA512a4d770403089a5fdceb2930a17bace712abf7136479c91b3dc443e52c5b9f4636ae81399d5a884fdbbbcbd43392435a42a072cd89b804b4b6a99e735a79663c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06