Analysis

  • max time kernel
    9s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 02:28

General

  • Target

    Galaxy_Swapper_v2.exe

  • Size

    4.7MB

  • MD5

    3b342bccddd3b9e2444a643bd42ebc71

  • SHA1

    e9aa3efd4d3f0a135cb5c304e9edd0555f539c1f

  • SHA256

    28102319adcc684a1f3c85fd4953b21b8b0b0433e35a4f01feea01d6379506d5

  • SHA512

    f925db08cab152d841c9601b900b2804d489b254f574c6f0124e4f41d7f26f209c7b103f2606710370a0af89e94aaf421c96aa31bf1ae552146abf0ccdf58d2e

  • SSDEEP

    98304:TNAlj2vL5CHSHlyFGvFomw3/49sOjNjTUJECByxW5B9ch12dlv+s+SbRSuYPjlFd:TxhsqYgRNcagIeD4uy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Galaxy_Swapper_v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Galaxy_Swapper_v2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=7.0.14&gui=true
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34bfc6dabdb8ac232d8402da2437e55e

    SHA1

    3f857e3eccd8e3daad9f8b64eb1696ee740dcf22

    SHA256

    5caee72222971abf8dd90cfafefa5e20b8e0394d045225cda51ccfba525ce7d2

    SHA512

    447d19bc46965d6e37797b75a4c7ac40248dd5116153ef060cecbb249e1f7532a050ada7ae6ea792cc6e7f61a6d94f9ab833f645d4c9acdeb2bf53d5033501ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c45baaccdaf0f9fe10f9ee123dc55cf1

    SHA1

    427b0e823c92ec1b436634482614c7be5cb90b95

    SHA256

    20a6b1921d3204cd450b153d2a1afc52af6a7afd4875fb71e758a3a6b7518522

    SHA512

    09217f859c639c23a71c26792432c4cc7a200d679ed6dd22dc80177402dede1e39a53b3b42b421a269c733c80a8821d3911482dae72a48f7b0b342f45e9a4505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d31a88ffc82f7775e73e8b37c067e2a

    SHA1

    2045092dcddcd54367d6870d413f9cd20bbb3f88

    SHA256

    2f152340bdbeeb5b7ee7462f834546b533e6b681185ed8c71a26230523421a47

    SHA512

    2d67754152191474b857d3d925e2991dcd93731e32fab0e099fa168483c68749e720b1065d97d6c152783e5883401ce0a24dcd7ef3f7fc2ffb932d6593b7f37e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d37d9131f5b48a3fcdccd189d8bb6b4

    SHA1

    7083a36093b180a38127614797423c5dae89a07b

    SHA256

    2d6bd0f51a07ebcdff38a2316f9143930a1c55d9c057a1d5a323e307c87ea90f

    SHA512

    54d6c6d964fb215d2a5dd5a17ce2cdd2ad92d7810286f69def259418d2204fa04742ac067e3f6bd93dccbcc2bc390a92000dd9caebb13d6264a4ad13a82e6783

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10a8f00a5b70f3cabd8eae7d1b9cdba4

    SHA1

    502e19056c88e0e2fc2065d35d1f4dfe34d17c35

    SHA256

    3897f6ac17f88d0a238ceca60df884236c9c3d67139e9df21546be48048ad4a4

    SHA512

    150fb767476e25f6dc91d61a295e85fdd69605d6f3fe95848a7cf30c6ca80c97eb617cd1ef89e3a02ac0cbe9034e4d688d8d29539b198a475498187c8030cfb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db5d7fda1821c394d885b1f1e5108a07

    SHA1

    a4f6c079e006591cf2c8520b9d957ce946bd6772

    SHA256

    a0cdadcd82fb1ea94f57328ebb0373fc48a00d57bc89ec101b8e96e2f547f31d

    SHA512

    26224377c26ebfb9ae33bb91125db4f19875c416a0a91c97aae14a0ff814c50d31bc682c3eab04d6534982c8e68d9307e6d5735d83c6f2e43f6993e2521e8d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f776a4c354e43abbe772100d02c9964c

    SHA1

    c7e13e3f9cf4048c02dd89a65f13659b83d03354

    SHA256

    d9535437b17c8f8a263df3a5edeb15f6bfed92ef95118905510ed27b2fdd1902

    SHA512

    a4d770403089a5fdceb2930a17bace712abf7136479c91b3dc443e52c5b9f4636ae81399d5a884fdbbbcbd43392435a42a072cd89b804b4b6a99e735a79663c9

  • C:\Users\Admin\AppData\Local\Temp\Cab670E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6859.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06