Analysis

  • max time kernel
    200s
  • max time network
    232s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/03/2023, 02:04

General

  • Target

    Mollitia.html

  • Size

    13KB

  • MD5

    e1c5fae0503cd0fd1340e7dbfccf7388

  • SHA1

    c98bc3316f8539ba3ccf270870dc54e148431bc7

  • SHA256

    7cb587666511e0a53253d9a399d5ca835804bd9d80ddd624528cf29b5c6141e8

  • SHA512

    1e5caf23dbea7e9b81780ba934241d4ba84f890a9d1bebaeb44d345657f6b5f79663a3e69ece9f2e7b5ab19e8b6ad4b45c1ab79546bdbe3a3896c7405b9bbc35

  • SSDEEP

    192:bxhMM+cK4lyu4n6DyTTosdiknGpxl+rpOhOZXCi886eqP9mDupYgVr:gM+cpgvosdiwmxl4RCenqumTVr

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Mollitia.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5048 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1228

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          95dd8987ec8ea85e178a3a360ee0ed33

          SHA1

          de7f7ab4ad7d633fe01b38bcb06d6f02cfafb3b3

          SHA256

          6f7a628906403929c013a1ec4fdb9c83fba9b87af91656f1abcc11c766b69d1c

          SHA512

          5a30826fe61418560eaaaa0544e2230d5f8579110e03603e102cbca764fb26348c2548bb58b4d17ab86ee92936bc00f726e79bddd51ce1ab707193d2bcdbc812

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          88b4dd134c092801aea2fa4e26bcba18

          SHA1

          d47fe06993861c1fe7457c61f80df2540a87cb24

          SHA256

          5e506f4977c9b0fd6e24c2a8cdcd12508acae04dd230866ff9586bcc48d83136

          SHA512

          60a7a64e60a9076ed240f7d4eda97acc2ba3250c2ddd124247faab6fb9388fc1a48c86765526159d819f72b57ab7169e3a5fb2149d82e5f064028c4be13e2edf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\480JMPRZ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8Y7VKMAJ.cookie

          Filesize

          243B

          MD5

          8660fb78e1af6777adb4d85c6db8e685

          SHA1

          7eddec7db699abbc1df4e88ac97dda0da40ae77a

          SHA256

          8f087e1f2295ba1cf8af5ca5807c53ab38de1e5cef2608ca507523e379f8ddfd

          SHA512

          8ff1465c4c2782086bc864c024faad22b52583de6e93a97d4df50b7f76b5f68ca871548a3f672cb71496079a34591fc95aaec3e93d36339fe2e7e1a64f494bb6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MOV3ZZ00.cookie

          Filesize

          610B

          MD5

          99d641824fb783cbb95ae4baef2593f4

          SHA1

          1a8680d54cac3593022235cb69bbc85fc8c0a1d9

          SHA256

          970270069e9c1d1254f7d88710298c4613539463cc8a8ec06d0670118136b420

          SHA512

          6942fe069239c1f7f52d38ea280ca7afef94390b82c33328231dbe1c2a6ea417c8f31b100af0d7791b07032fbb4234b0fb031321338c24da2df31552f638b3df