Analysis

  • max time kernel
    68s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 06:06

General

  • Target

    http://arxiv.org/abs/1002.4568v1

  • Sample

    210113-26el8lg12x

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 67 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://arxiv.org/abs/1002.4568v1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    7a92903dd8fc88921d58c804e6078ffe

    SHA1

    053271b8e123e583ccedd991d0e3082f691f3b39

    SHA256

    8dcc2ec41588564bbb62310e4fa22cd8e350fdfe20c0c1cea7d32128d88fc0fe

    SHA512

    7e411a2a888a67ab1a245bd87b927933997065f099c4d18d0c086e4d21a872537b6307186fd34e6b3d9b7bc85df663b1d37ebc4b5d18c61e66f74c2c04fcf61f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s7iy1jn\imagestore.dat

    MD5

    bd272d2ac2eeb6df1812358cc129af32

    SHA1

    2ed6177a217cd93ab0f365e81f215297ec2cf17b

    SHA256

    05f7d22444ff39cf946d421dbee50272e9490c265500d0c8b046d86d6386e3e8

    SHA512

    a48035ec3dfd085ac41ed067e4bdb978f265fa99d97a0e19e824f4ab14df2e28f2d38cfedeb1902bcc8b55000f782afd8c1a6e410e715e512f78ea0a33e56834

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X8OWRSIE.txt

    MD5

    bdb74a28100c519e45aef945a4166d67

    SHA1

    73485cb57d5f1176b1f96768707c85f0964cc7d4

    SHA256

    e73355fa2c9a1d533ac4c9b2b73091991e2de7469c4e19bc43abeeff612137f4

    SHA512

    790553b1b89f6ac7f84874720df2e5abee87fb2646b94a6985cadbad102b6f34a8004584f9a9b5aa6a4f81afa2e0c15e3a0240ff216d656258e33e795014b75f

  • memory/1264-2-0x000007FEF71F0000-0x000007FEF746A000-memory.dmp

    Filesize

    2.5MB

  • memory/1992-3-0x0000000000000000-mapping.dmp