Analysis

  • max time kernel
    66s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2022, 12:43

General

  • Target

    ralink-rt5390-802-11b-g-n-wifi-adapter.html

  • Size

    221KB

  • MD5

    9ffc0770710b433a360267865552ac92

  • SHA1

    bfb9683155853f0c28c39d55a5a864b55c6fcf56

  • SHA256

    e6d06c3ceb6ae761b45b0f39e1b4bb83a28e5541bc4bc63e27b1af04d9561e52

  • SHA512

    e8359ca2281c0217abc291fd1824d69fc15ca5301d253a6e0064eb62464e5d723672c1f3a802f08545de1f86f711a79f317cb4bd8d1d237a0913b3320cf444a2

  • SSDEEP

    3072:yX8JZP63OKNAvT11s51th8dzkRaAQQBDgfj4e571I72om1AeLm:dZPWyL1651th8OB8AeLm

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ralink-rt5390-802-11b-g-n-wifi-adapter.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          ca2366933f20552d83b937e715470146

          SHA1

          26f592dc98b501c4a9de315f47b1c72878e4a1fa

          SHA256

          fc5eff35973b55b22d81180307e9132a03854fb589f50d1bfa39cd1be97ab95c

          SHA512

          a61d13fc43a8729c899583534f72d8b2cc73439a06b385328c40b1d086dc0e528264391b2a3cf376b809bcec2580f6404e7e81d5b1ba51779508e61727dfa500

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LAQPFKKL.txt

          Filesize

          603B

          MD5

          7b3417f140953d1f74ed1132682fb456

          SHA1

          99689be6937474bbf01a8f87d00af69f257a7fdf

          SHA256

          3c12a9d27544c97d6dca5f7a85f5e38fa35b5df50e81b57d6ee2bba34761bba2

          SHA512

          aca4b5d1d01087cda6b2d53c1ec1bcca45ff727929a21ccc958cfaa73f0a8b5c756014ec3fc245e07cc4a0f9744fefd69eacb9ea015fce0f6dc7f90a9fa7a712