Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 09:25

General

  • Target

    SineeDriver-英文可执行文件(EM760)(1)(1)/SineeDriver-英文可执行文件(EM760)(1)/SineeDriv.xlsx

  • Size

    19KB

  • MD5

    3b70bd7a2fd221492b56bfc7d0f2396a

  • SHA1

    f67fd9464a4c03bdf049402d759e7a7af21e557c

  • SHA256

    293297002c0d62a7d49586d89987958156d9023b2996fbe1a966b8522314ae5a

  • SHA512

    1d09f3dc2a2b90f381c7402a6aa2dd70fcf93747da610264e0d99db418987885f35cbca323b17bad7c1baeb2f77cb2317f77bf7663e7524d53a29243946e6114

  • SSDEEP

    384:lNfbdmTqyzx8Nxhq4da2XDpX53v2cyHxQC1Or:lQxt0xhDda2lJuZG

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SineeDriver-英文可执行文件(EM760)(1)(1)\SineeDriver-英文可执行文件(EM760)(1)\SineeDriv.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2412-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2412-1-0x000000007281D000-0x0000000072828000-memory.dmp

          Filesize

          44KB

        • memory/2412-2-0x000000007281D000-0x0000000072828000-memory.dmp

          Filesize

          44KB

        • memory/2412-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2412-5-0x000000007281D000-0x0000000072828000-memory.dmp

          Filesize

          44KB