Analysis

  • max time kernel
    33s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2024, 02:22

General

  • Target

    GalaxyFix.jar

  • Size

    1.9MB

  • MD5

    f93ce57178efa82666f4cd3c3f1ff3a1

  • SHA1

    cd51691cbd2bb8fd5eb4f712f4850b0dd6cc939b

  • SHA256

    c76ce6ece9ab0793d6179c60ffdcf524a9a2f27fbc5036113879a346dd5e7af3

  • SHA512

    4c336520edd1839071d782a7a67896b46af6c81df6ebdd9ed9ec739966d03365a3d15f117e84dcfc35fb47620220f33e54f8f72db7cd33c7d536fc901559ef82

  • SSDEEP

    49152:xHpM+V0BeAzbJnJHaMfFC8zq/rBTnry/ONTKQ4:xHpMve6bJ7fI8zqTRnW/GJ4

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\GalaxyFix.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735352551192.tmp
      2⤵
      • Views/modifies file attributes
      PID:1560
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735352551192.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735352551192.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1735352551192.tmp

    Filesize

    1.9MB

    MD5

    f93ce57178efa82666f4cd3c3f1ff3a1

    SHA1

    cd51691cbd2bb8fd5eb4f712f4850b0dd6cc939b

    SHA256

    c76ce6ece9ab0793d6179c60ffdcf524a9a2f27fbc5036113879a346dd5e7af3

    SHA512

    4c336520edd1839071d782a7a67896b46af6c81df6ebdd9ed9ec739966d03365a3d15f117e84dcfc35fb47620220f33e54f8f72db7cd33c7d536fc901559ef82

  • memory/3844-37-0x000001E7EEDD0000-0x000001E7EF040000-memory.dmp

    Filesize

    2.4MB

  • memory/3844-27-0x000001E7EF0A0000-0x000001E7EF0B0000-memory.dmp

    Filesize

    64KB

  • memory/3844-19-0x000001E7EF060000-0x000001E7EF070000-memory.dmp

    Filesize

    64KB

  • memory/3844-23-0x000001E7EF080000-0x000001E7EF090000-memory.dmp

    Filesize

    64KB

  • memory/3844-22-0x000001E7EF070000-0x000001E7EF080000-memory.dmp

    Filesize

    64KB

  • memory/3844-25-0x000001E7EF090000-0x000001E7EF0A0000-memory.dmp

    Filesize

    64KB

  • memory/3844-2-0x000001E7EEDD0000-0x000001E7EF040000-memory.dmp

    Filesize

    2.4MB

  • memory/3844-15-0x000001E7EF040000-0x000001E7EF050000-memory.dmp

    Filesize

    64KB

  • memory/3844-31-0x000001E7EF0B0000-0x000001E7EF0C0000-memory.dmp

    Filesize

    64KB

  • memory/3844-33-0x000001E7EF0C0000-0x000001E7EF0D0000-memory.dmp

    Filesize

    64KB

  • memory/3844-17-0x000001E7EF050000-0x000001E7EF060000-memory.dmp

    Filesize

    64KB

  • memory/3844-36-0x000001E7ED4F0000-0x000001E7ED4F1000-memory.dmp

    Filesize

    4KB

  • memory/3844-45-0x000001E7EF070000-0x000001E7EF080000-memory.dmp

    Filesize

    64KB

  • memory/3844-39-0x000001E7EF040000-0x000001E7EF050000-memory.dmp

    Filesize

    64KB

  • memory/3844-40-0x000001E7EF050000-0x000001E7EF060000-memory.dmp

    Filesize

    64KB

  • memory/3844-46-0x000001E7EF0D0000-0x000001E7EF0E0000-memory.dmp

    Filesize

    64KB

  • memory/3844-38-0x000001E7ED4F0000-0x000001E7ED4F1000-memory.dmp

    Filesize

    4KB

  • memory/3844-44-0x000001E7EF060000-0x000001E7EF070000-memory.dmp

    Filesize

    64KB

  • memory/3844-48-0x000001E7EF080000-0x000001E7EF090000-memory.dmp

    Filesize

    64KB

  • memory/3844-49-0x000001E7EF090000-0x000001E7EF0A0000-memory.dmp

    Filesize

    64KB

  • memory/3844-50-0x000001E7EF0A0000-0x000001E7EF0B0000-memory.dmp

    Filesize

    64KB

  • memory/3844-51-0x000001E7EF0B0000-0x000001E7EF0C0000-memory.dmp

    Filesize

    64KB

  • memory/3844-52-0x000001E7EF0C0000-0x000001E7EF0D0000-memory.dmp

    Filesize

    64KB

  • memory/3844-53-0x000001E7EF0D0000-0x000001E7EF0E0000-memory.dmp

    Filesize

    64KB