Analysis

  • max time kernel
    118s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 06:06

General

  • Target

    http://arxiv.org/abs/1002.4278

  • Sample

    210113-y5qs9575p2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 67 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://arxiv.org/abs/1002.4278
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d4f516ed42c11f6c9aca5d53f40d9940

    SHA1

    a08c285f1e637ac81c11a4698dab3c6a3f990159

    SHA256

    ab77c8485175aa3175864cb20987616bbde2e70b7fc323cdb04c134cc9cc36ee

    SHA512

    ae8010da6a8f23a7cffe735b6442977262bc44d8ac152213a0a33b0ccf3b7624840d4708332d1a972dc17be1e58ac713ddee31c8e8ef746ba20492112bfc3d7e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
    MD5

    187929fe4e32d71f9e4721ecb60d520d

    SHA1

    9d21198f6a481add8d6fb4699a9740d0862a9a2f

    SHA256

    9e67efd42019f053ee1a903aab3079d923da05f7e79253ba5f7f079dd19f5aa5

    SHA512

    f61633461055d773e38ddac6f50a81bdaf35fc6f20dfd0968aa0b9e304f48110cfcdbcfd8576578d2bc2479209c859b0e9731f1cbfc6e8dae255217f37c464d8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KBLGCKSI.txt
    MD5

    b36379556f643661b0a25c22ffda614d

    SHA1

    f62cd440f7e8af25486a41222f6643cbe1c08fd7

    SHA256

    aec12c8af5aef6836678d6e5585f243dc3dd94cdb5e4b08fc4efb5e4eb5e4c19

    SHA512

    5b242762c36f57131b5d44be2e3426e1c410c40ef7f2fd356e384a01c51ad5b8b19dd331adc5b02850f3397113d088bc6db589263bf4688eaa73ff3dd1830316

  • memory/1760-3-0x0000000000000000-mapping.dmp
  • memory/1980-2-0x000007FEF6510000-0x000007FEF678A000-memory.dmp
    Filesize

    2.5MB