Analysis

  • max time kernel
    73s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 17:38

General

  • Target

    Galaxy Swapper v2.exe

  • Size

    11.9MB

  • MD5

    570fb249f85784a8a059095b10d37744

  • SHA1

    dadaa0af4a7e8d7cc0934b8f70fc9a805cd5b3db

  • SHA256

    10838c8072107a8bf671cc9c4cfa241cef1a6cca04c90ceb0fe2d17b37d6a9a8

  • SHA512

    e012009e858fda3fbf8274b66f7837025a1d8ba2ba89a9effea0a76e1ba34f8b5f8d066137d3e409a316bdfd1c4f3f1971b81d6e13c18bd6c711f1da2a9558a6

  • SSDEEP

    196608:OErvRKcphG8nxS3JYw2uffH9Za4Ob6be2BZiHhWWiVbMOVvu8ovcLFwiS:OErvRKYG8mRMcSGicWiVbMOVvuxvcL+J

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Galaxy Swapper v2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=7.0.20&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a917acc43bdfc2fb398565843e4a74c0

    SHA1

    a579355b70404f001eb9ed1ea2b05395128d0fa3

    SHA256

    3f1213cd044d7c8000a9765658c5d6999b986e5dc9217b32dc0c032db29f892e

    SHA512

    dd0e4f41b36e922cd1d3e468e05df324fd3dc9a0dee09083dea66030994aeff0b965628978a26934f9fa5ce691f818be68bbb6fe10d9e71072cd639a1d395186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da2188a71a4f9b2507d084200f0e435b

    SHA1

    8448db9c13dab1c58a01e7d23b8c208906f53fac

    SHA256

    7a883f7bec4f995d74dbad26c76b58418e7b3a755569321a19421aa4292619e8

    SHA512

    4d12c3cbba4e50b7edef039f48c4bd906b702ba5fffde3e5402abc2bffb6277a4bbbd64fc6ee49ba32be83aab6a468f4ce16ab9a62fb2be170436df9c23fedeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a2cb891b3360893b8abb54c6efcab57

    SHA1

    361d46a95b2bd612671f4b111352fa70d3d87c88

    SHA256

    fee4a6af76df6ec1ff2e4a954b59cbcb46de4ff2f07eb5dc794239e5f9ef814c

    SHA512

    2f81838774f434823c4b170ee3bdab8411f86753475fdcf9ef43488cbeb65a07abc0f8192d6c94e322acb8eb24ed515f3055930493cf7ddd9502d6a27468adbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5526071ec8d14c051509bd1c366a9aff

    SHA1

    49a9cc9490d10bdd1f29d088d0887535e483ea60

    SHA256

    b651d0f362d292996c24ea2a6029825c6b4502fb687a7450fe53659ce1eb0bcc

    SHA512

    08a9af4bf7ed39b5e1eae41cd658aec97b0b1ef60d1df4509afeadacd932cb9c3cd9b34a8d9b317de5a5bc788f6af7052be5865d75c646c5ca32dc2a3ff19c74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07ac5b51da9328bf4423507d530b2a12

    SHA1

    aa2b221f853d253ad2ef2ac91f72d4138134f469

    SHA256

    c9a74d71d5b7cc2d80578c2712b22b64081b6642c2270b912a4d97ef81303883

    SHA512

    1a24a2cd5805c011ceaf08c126dd948677c937a36c9f4a0587bdefc984a830d101b6ccc3ff5a08f9b52dadd7467b57a95edcfbbe108462d80909f753ba012490

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    572da9c577b9992e37a42a5db14e7395

    SHA1

    65bf73f9dde6786fecddf9f80f8130b9cf500f37

    SHA256

    4beb248d92e8401c2422c68c8ec2f0d911d7d45c88a09daa09b3b70ee9bef328

    SHA512

    b3119cce4f497455332d2c44f9f911340032e285a95f3a708d56430065e5f5d289e4a6c9dbbb2522b9f22e917ec086828050b12b59879417a870e3fc926c6ff4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c065af737fce2b069e7c5eab460783e0

    SHA1

    b4f870fbac0ab456a1d6d62e37a066581dc6ef81

    SHA256

    041c94a4300c2abf3ed3d5ed983aec2584eba3ad798339b0eb4e432135736604

    SHA512

    cc0a6c7241064da71cc5e181bc21c80e1db0987fc0ba6667ee1af668afa35ae0e551e6cfdab1b80f81293ed3c8ee3a423e27c2856e7717e1657fc034a4595c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7222c0b9cd97ee22d7444eee920c985

    SHA1

    7035eb424218caca797ddfc41ba1151de0d0b0c5

    SHA256

    06537fd7d50d4cd26435bc284f9f7a2a5250db72fe1ebc227be9f0da7097db9c

    SHA512

    f16a0db8d5982ec98934e679407ee425d98609cd594a5758973442ba2c5979250d742b16313c3f83a91193e17aaf945a71a089866c5af146e0f6e2d01ae2ebe1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    384a790d5047ca1897c507d8f54f0018

    SHA1

    2f0d88b4389685617b493b0c77b21b49028a0913

    SHA256

    30e6d32b7ed0f0790c6a4a5b90456e2d916207a98028853ed56552ea41fc17cf

    SHA512

    b06b2501f6e3d9bf563e60bd1979248500463ab4fc1abe0e1bdcc33821d231aa85fd41ee448a486a4c3f63a5b5130a8e03d1816bbf18afefd67b5342bf587e41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53c9f04451fc38f9f0a085ed7cba3abd

    SHA1

    cb960debcc157a9aaaac2c400c79938448fccbf2

    SHA256

    05c8af979c0ed593831ff655079fd666f99988e8982800605d02eeadbc895605

    SHA512

    3cda78f7cd420fd728fae099ac0682d08a8872f9661d96d36563734b06cca60f4a99fdd4ca895941d330d07956bdd6cf950d6325f77cc64e886df50b904a1f27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b9832235137f02c47065088c41a32a5

    SHA1

    0ad5553821b1b6d173d94692e117f4b1079c61b3

    SHA256

    2275cd4109a8aed93c680ef23dbd02fa95df316c0bbe4210dda1baa492233fcc

    SHA512

    21826d700fed72b25e6da28a308652f64c7de101f752dccbabcef605d8240dd1b138b86cb12f11a1810f1009102d2357134e74948376b9acaca1c815fb8a551a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d4c7afe8493971c84c9bf12619ad12e

    SHA1

    e262ff08a4d3cea728c584dd2a2e37ab496787eb

    SHA256

    fe7f7e62af9be2314e6e2500c0823499f87371d30bf5539006b6cdf20a844bf3

    SHA512

    5707c7308eacf9eba1b6f9e87ecfddae00227e3b6da4321c87d25124006a72fc9d64855f7f50595708394a7167d39266ed8a3bc747ac861fb6269f6473c6def7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01da9fc342d1b7b6d75c9842127847e1

    SHA1

    3eb0b36d80966a521e97a185685b514aae5a005c

    SHA256

    1fc04f9acae69f67dd5b235f53e7256930a9714dfea9ed0c1806e78688414c45

    SHA512

    651ab728e29c1bf85d44d29579fa416562c222912df33974a4fb7ceb30c728719f09f214670cba1116da8a578e7f539f68daf18563a674f934b016b197cdfd38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1b9c55ebead38a33c872221fdac60ea

    SHA1

    dd2d1f2ebc336ad63ef0e23f097e91feedfc8c0f

    SHA256

    6d89d9527d30728d73ccea16c707cd09814f5f64ddf614446bd6384bb2256946

    SHA512

    cdb9c5e11a1a20ebd89eebde59bc0c1b99821a91572e1214aa45df7090a92f8f6af5e80cbb8788f350115beb09c0e0decfcfbaa9a3d00c6f0cdcdcf35e575d06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4c2957714f5e6aa1e93db9fa134904b

    SHA1

    48eca9e5fcc79286afbe9af778b8c5307530154d

    SHA256

    1429d64b8725bb1ff843025c07bb0494afff925331f5ca0c0cf9eba4f65db5b4

    SHA512

    d104c136ae07737643f97ee9279dbdc7c0d0eb7910ca89b1c3ececb4d5cc67dee7a96f5ffab066629416022584a7c832651ebc0dc7d83d4faf382603861addac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a6f7ffbe947c1d117f96c898c77b2a8

    SHA1

    f663790a3a42fc6ace09a1d0494fc29d1a5ae0f3

    SHA256

    0399fcecf34dcadbcda155423cd22f91ae75991c843916a693f9637f32aeb8bc

    SHA512

    93ffbba2d73b0e8dfbb67721dcb651dcc297d8b892e41c12dd16b8f8a928185e0ac9e1a4d4f46488b0991398e9715acf3304e13584eb96fa6c68bfc8162cf980

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb19f7a325e1fdee36aa64f00ba4c9e1

    SHA1

    4752d2d5324c9811417bf00602aa8411026a68c3

    SHA256

    16f4a42cbbc36f2fbefaded09b0f17629917b6476146f64aecfc2d105290f4c0

    SHA512

    dda79b23c61a7a81d7ce318601e4d6a78cfa7c256ba8816638a7e0f7c9421598b84dcb34373b20db690337bf38f6297ded79e91ff104980c20becb7406a298ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67dc9e4b865c551448bf54963b10e3c8

    SHA1

    bd9268ea62f52a1980996d417388fad52e836a77

    SHA256

    87cc8970125b3b0930bee33dbc4090b0d27d3418e07947ef0dc9cf660297e299

    SHA512

    18b81a64d5c1dec0c3dc065ca9ab4463364458a5105f776592e9912220c52eac012170c9728721ce3fd331526ed6e8d1c12ec341511c84657a4d696316e870fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e069cf95ab11965deeae14e13316df04

    SHA1

    af049490b29ad9bfc0a03b382e985b864791bc79

    SHA256

    85afafefe75ee03b1ea2d02083dd11288bb2ec6f67a6999cd701ebf0c137299d

    SHA512

    e7412ebb24922517a8b9e7dd5a8d7b48e84b1683e9be6bf3e06ec03483b906bf58f27ed5d58ff786558648fd4ab8a0c1e5b3a66f7dc4e01c6af09ec34971d61a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9031c6501cf92c8d564e05896e17317

    SHA1

    2f57f52e43723b413acc32889a61d675430a26bf

    SHA256

    d30ced939dc76992f6bd47c682d84e0233e73a97ae1a059133ae4536902bbcdd

    SHA512

    4e31499030dabd1cb790c9c123ad43a07eb43b06c39bad38a25bfd7c7bb9d242f9d9c7a53d5cbcb7c5036a1f2252416277473f268df1d7d061864b5b73638331

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16413a28eda18692e8a629835a1bbf84

    SHA1

    0fc860066bcff282381e9b6deccbb66caa2e7c34

    SHA256

    fc1ebaecaa1f2187cf1f5380cab7f0bbf54afc30a0a4361bfe08a26a87afdea8

    SHA512

    0f7e8ae1f1f738f520d9f6cd379fe22103fb49f982a6476cb5f59dd2a626dcdea66d3a9c506b911755f599a592d0754a95dd5d8da070498171c2be27f59272ff

  • C:\Users\Admin\AppData\Local\Temp\CabB147.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE140.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b