Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/04/2024, 18:45

240428-xeasyaeb87 8

28/04/2024, 18:41

240428-xbwk8sed9y 8

Analysis

  • max time kernel
    599s
  • max time network
    405s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/04/2024, 18:45

General

  • Target

    Galaxy Swapper v2.exe

  • Size

    6.6MB

  • MD5

    362534604c83884bcbb66742e6d767fa

  • SHA1

    ec50397edce3ddc80efbe717ce1dfed6017c18f8

  • SHA256

    af3a373b06166621175105df5827ac1a295ad9ba0ce4724abbb35b85d641a223

  • SHA512

    b6e3d58c8b45e69deaf9e3547b120f0b0470bdcb7284dcf3b7513bc35349d685c5bbe4c664a27087d404c3387b3bf23d01f360fcba952ea205f7e9f23f34d0eb

  • SSDEEP

    98304:w/JuhFG34eXXRYgqatNSTptB4SROZ3T0EIMMOb6z4eDluupSUD39:w8hU34sYgRNSTZJQgEcOb6z4eD4uP

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe"
    1⤵
    • Checks computer location settings
    PID:1496
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4544
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4176
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4724
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5028
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3268
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8S7W85J5\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\50DB4859\dotnet.microsoft[1].xml

    Filesize

    17B

    MD5

    3ff4d575d1d04c3b54f67a6310f2fc95

    SHA1

    1308937c1a46e6c331d5456bcd4b2182dc444040

    SHA256

    021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44

    SHA512

    2b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\50DB4859\dotnet.microsoft[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\50DB4859\dotnet.microsoft[1].xml

    Filesize

    83B

    MD5

    2714a99bf4295769489b1b83aaf77835

    SHA1

    a1dedb6a62a57a8d5ae3b8db83fcbf49809ea55b

    SHA256

    879e06d65884be5ab8622b5791e6dccbbf9a5e64e26aca7c66e841079ce7f21b

    SHA512

    5074b5cf850643da9c44e1b998dc061c50f9763e84c9da7aa40489e4fbadffb7a39c754a7c730736e40c21ef28e999fe129e40bb6813588b8ec8351da5902fd1

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\50QLTXOE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\WICT49KV\windowsdesktop-runtime-7.0.18-win-x64[1].exe

    Filesize

    32KB

    MD5

    a86e12512f0b5c89ce9ef6bbddcf58ea

    SHA1

    906c186ca5d4b9baf595b405f609029e77d757ec

    SHA256

    219d1d323da91ec6ffd6c380a7b669ecd5a4468b038197fd425d9d1ffd643b47

    SHA512

    181f27d8041cb701ce07b10d3c93cb649274e8430ea8710dfd7bd175ad9693eb959d8b0b603ce15c004f04a418c06a005965d22c83d96cfb44530db2572d499a

  • memory/3268-65-0x00000196B9C00000-0x00000196B9D00000-memory.dmp

    Filesize

    1024KB

  • memory/3268-243-0x00000196D1000000-0x00000196D1100000-memory.dmp

    Filesize

    1024KB

  • memory/3268-63-0x00000196B9460000-0x00000196B9462000-memory.dmp

    Filesize

    8KB

  • memory/3268-58-0x00000196B93E0000-0x00000196B93E2000-memory.dmp

    Filesize

    8KB

  • memory/3268-139-0x00000196CF6C0000-0x00000196CF6C2000-memory.dmp

    Filesize

    8KB

  • memory/3268-141-0x00000196CF6E0000-0x00000196CF6E2000-memory.dmp

    Filesize

    8KB

  • memory/3268-149-0x00000196CF950000-0x00000196CF952000-memory.dmp

    Filesize

    8KB

  • memory/3268-147-0x00000196CF930000-0x00000196CF932000-memory.dmp

    Filesize

    8KB

  • memory/3268-145-0x00000196CF920000-0x00000196CF922000-memory.dmp

    Filesize

    8KB

  • memory/3268-143-0x00000196CF900000-0x00000196CF902000-memory.dmp

    Filesize

    8KB

  • memory/3268-179-0x00000196B9A00000-0x00000196B9A02000-memory.dmp

    Filesize

    8KB

  • memory/3268-345-0x00000196D13D0000-0x00000196D13D2000-memory.dmp

    Filesize

    8KB

  • memory/3268-61-0x00000196B9430000-0x00000196B9432000-memory.dmp

    Filesize

    8KB

  • memory/3268-273-0x00000196D0720000-0x00000196D0740000-memory.dmp

    Filesize

    128KB

  • memory/3268-272-0x00000196D0740000-0x00000196D0760000-memory.dmp

    Filesize

    128KB

  • memory/3268-312-0x00000196D0720000-0x00000196D0740000-memory.dmp

    Filesize

    128KB

  • memory/4544-0-0x000001D550920000-0x000001D550930000-memory.dmp

    Filesize

    64KB

  • memory/4544-35-0x000001D54DBE0000-0x000001D54DBE2000-memory.dmp

    Filesize

    8KB

  • memory/4544-384-0x000001D558EA0000-0x000001D558EA1000-memory.dmp

    Filesize

    4KB

  • memory/4544-385-0x000001D558EB0000-0x000001D558EB1000-memory.dmp

    Filesize

    4KB

  • memory/4544-16-0x000001D550A20000-0x000001D550A30000-memory.dmp

    Filesize

    64KB

  • memory/5028-45-0x0000024A31580000-0x0000024A31680000-memory.dmp

    Filesize

    1024KB