Analysis

  • max time kernel
    68s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 06:06

General

  • Target

    http://arxiv.org/abs/1001.5445

  • Sample

    210113-12phnmxv12

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 67 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://arxiv.org/abs/1001.5445
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    42cf04ccdf8d4ef4bc088e6398999565

    SHA1

    7fa309cbe078b800146f67af7681baa051b8b0b7

    SHA256

    7c924e387b43b79434830188af461460a01917c6feb5bf4d022063b1af16452b

    SHA512

    d19b0e89ed8b77779ba288d9e21a11be9e17f710d134a456faf4b76b83fb041b45fe895345ca7c9387f2bb5d0790a6438411cc64fb2d9a1d6e7823136961ae71

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s7iy1jn\imagestore.dat
    MD5

    df1fbff44bcbeb6e991559723f2591dd

    SHA1

    726600397538c70cca5dc835735893089a504bdf

    SHA256

    4d122deea17d68bc8b17b00bc331468152f7671d994aa15144ab880a2e77ae5c

    SHA512

    b1fe5ed9dd1311965ecfd701811f9855fc499baf9fe18d9d1bd9ee77b4122a6a636e6808f45e3773c55ffd8c08ff24b15e63d0f1ceb17b6b072df4b312f0848f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5Z29UJ74.txt
    MD5

    1e15936038be782cbd2c69d043464644

    SHA1

    43412a4a3f5fbc8b151c49bc3e49406e90e5bffc

    SHA256

    22200d420d8c5d6989412df7edc42026541229922e8673a88320fc0743f6e73c

    SHA512

    3c4b62cb04e87d79b59508734546788902eb3f58b4f46f744ff23fb2084ccaa3b81e8dc9100e1c1e0aba0028a30e8de314f8cca5a3ab339b4068b759ddb01386

  • memory/1408-3-0x0000000000000000-mapping.dmp
  • memory/1488-2-0x000007FEF7140000-0x000007FEF73BA000-memory.dmp
    Filesize

    2.5MB