Resubmissions

13-01-2021 12:15

210113-whp4hb3t5x 1

Analysis

  • max time kernel
    70s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 12:15

General

  • Target

    http://arxiv.org/abs/1002.4568v1

  • Sample

    210113-whp4hb3t5x

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 80 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://arxiv.org/abs/1002.4568v1
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:60 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8
    MD5

    9b81e0d7b3f90c25b8d547f74009585a

    SHA1

    01b64da0c697ab200a93f3594d44f264b0019af9

    SHA256

    f7283b6b932d8e7c78c1317dfd1dc03c7c4893f31e459e43a3c737aeaa7da0ab

    SHA512

    a69f3b389738aca0b43f9999af664f849185189c9414a085f990120211434a89f6d1bfb939170307de2e33c4c873048ec2b2628ee8435f71f2bb703a6c069c2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    a36b44d5adb4041932847abd904a977a

    SHA1

    d26d17290820c64c4139b4677633df29ab51c6b2

    SHA256

    9cff6cca3aa67e7e5ee897b37889577e1cfb2b68036849202a11b33d9cba569f

    SHA512

    4edf5ee43ed3045b027027ee8b4d16595c7e4945eb60d24ea4d37ecbbb9e1333e01cc6a0031af28edcf26b686287f1ad4ae2093853ae71a1747c428e78d0832e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    515c738cdc665a3e21bc5fe4c09d37f5

    SHA1

    6d48f051ffe67270efda61d3d848a5dedb79646b

    SHA256

    186b3816e5fdabc00b8d7045acc8f4e233e553b43fa311103ae6cc458a628c4c

    SHA512

    0ebb98cfda1d58012cc112dd1ce2f11a6b99c2bcc9b4802cf13fa7f8099036f94dafa9a8ac5c35be67f8bc4183fe0120568d55e436d53679d57802d0060f5cee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0DD30266AF9B4A57FF10335BAF014F_9F9B4C41F24FFE47CB703486CB505815
    MD5

    1abd904eb18b459c0b56d435f5b2651f

    SHA1

    374bfadb1c16e6cab8deee81fba9a7292251200c

    SHA256

    d8566b3eb67ef1b5374b2a4b79547db9894ddaee4822394be4e5e6f67264ceae

    SHA512

    a82c43cbf6b52ffb30b02c0a2530332c9c9497f3542f3a74dae3a1460c4942da9649e255b4770cdabc883cbafa31934e6503da98c0a91597fefa2ea0c0c0a154

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DFECE1A4D0C745EF29E7B51A2DA008B8
    MD5

    277b4277a8e3904fbc865414137eb9eb

    SHA1

    783c2431ae17499159b0dce57f07d89e9ccc0f16

    SHA256

    2d4d6a38a0cd8b6857ceac12f6c876950e9f00027fa8828c569ec2c242c2b51a

    SHA512

    f5380d869c7079e5be8771e698e01b8119a1d90dd2f5cdde38ec9b1d101449e3cdeb670b80a167ef6f2f6c053b8ee871d948309c33bc8d463670a1c710cad443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    44757f13b11d7534d6e4a9733ca3d9e1

    SHA1

    3b9384d5c1e699b771498ee75d2add85f27883f4

    SHA256

    1fafa77d6c037c4747d8a6d7e65f46e021ddc07a2208e494ad376ffb85917c3a

    SHA512

    06385a119fdcd4b35077cb2c2df271b8e5a251a6330f6781c86acc4977f20445f21f83cde86665db451071eb53b5597d5146eb8002b1d77ca8d5a819d6d27d8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    1cb33ad0aef845885d249b32080de218

    SHA1

    c8c0ed29b845163054afeb9fa8ba347c21b90ace

    SHA256

    5f2871fa5ee2cba1ac9c12b9313c76dd2f3f8d2b0bf26e7a7d9abd414af6bae9

    SHA512

    5cdd323fa9ee040a9db356b0db5692ce65f90f24e5a67d92342ff92087307657ce5557795e0a1bec57deadf0ea58827d8b36c0182c2534a522ce548048a7d79c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0DD30266AF9B4A57FF10335BAF014F_9F9B4C41F24FFE47CB703486CB505815
    MD5

    1ce92b54b282a697a50252ecae0cecc4

    SHA1

    50998f8454cd0754efe3b41d3fd3863d60bc3f34

    SHA256

    ae7f358bc7bf415c9059d8df33791f6de2341e3e8d6776b44023fa433bbab825

    SHA512

    f10518a40dc9be366e11c6e39494be62e4c5719287d324734e85a9990946e01ad136ec8f0b68b4f6122bc13b4e72d8fc9cc49c32e2f53bb449cc887573852793

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TP0FOCCX.cookie
    MD5

    35545e74a320306e22ff4054997e5019

    SHA1

    3f723a7e30fb4e29254ae24962a06b15eb7084eb

    SHA256

    98955f11550310532c25142a073240a7d041ec3053b759cc4bb1a9fd2faf7fad

    SHA512

    6099428cce4de02a649ac13f81e5c31f575b6aecd9df2a8ad1c971c1867a9594642d382d18477328cb32d8cffe4757d24c44cf211b54a93a0c44670cd453cfd2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VBZSIB0R.cookie
    MD5

    ed4b976ea2dcf2f6499795342fe2c550

    SHA1

    1fe8ea8a50327ca35af214442e4dc5d9ffd0ac29

    SHA256

    8648626f29b94dcab980739d509c36d19c4581f8e7c2b74be5d041d7ee73835d

    SHA512

    fe8e55f3ace4fe615010d86f05e49f921951f0ab43bb12434c95e3e17bce995b561f06e452ac16ee63efb017da911dec56f307170207e01d4b2ac433c1d9c9f8

  • memory/4020-2-0x0000000000000000-mapping.dmp