Analysis

  • max time kernel
    100s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-03-2021 12:08

General

  • Target

    inj/com.mycelium.wallet/index.html

  • Size

    7KB

  • MD5

    9187ae8cac4bf6c4884a503fc00927b5

  • SHA1

    e90ab6ea949a7e09cf37ceca1a409bd55604ef88

  • SHA256

    8df787c74e414b4b00261d02af400b927b66ee4bb4641927277576c4ba7a8a0d

  • SHA512

    00e833acfa8f49c2f27c96bbbcee81a9f42e7cbf85a3c1670b9ca32be402a7127a43a223bc80e4f42893f0e764139b83458c96374983e270ec228f20be93d502

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\inj\com.mycelium.wallet\index.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1068 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-4-0x00000000756C1000-0x00000000756C3000-memory.dmp

    Filesize

    8KB

  • memory/1840-2-0x000007FEF6500000-0x000007FEF677A000-memory.dmp

    Filesize

    2.5MB