Analysis
-
max time kernel
1748s -
max time network
1160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 23:56
Static task
static1
Behavioral task
behavioral1
Sample
7z2201-x64.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7z2201-x64.exe
Resource
win10v2004-20230703-en
General
-
Target
7z2201-x64.exe
-
Size
1.5MB
-
MD5
a6a0f7c173094f8dafef996157751ecf
-
SHA1
c0dcae7c4c80be25661d22400466b4ea074fc580
-
SHA256
b055fee85472921575071464a97a79540e489c1c3a14b9bdfbdbab60e17f36e4
-
SHA512
965d43f06d104bf6707513c459f18aaf8b049f4a043643d720b184ed9f1bb6c929309c51c3991d5aaff7b9d87031a7248ee3274896521abe955d0e49f901ac94
-
SSDEEP
24576:mGIyixBMj+/A2d+UKnvT+LwZWj7iDDVVYrz0rbzGTw3DoA/sk6smE:mGbj+/BpKnvyIxVV/XDoAfmE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
7zFM.exepid process 2012 7zFM.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 3156 -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
7z2201-x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
7z2201-x64.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2201-x64.exe File created C:\Program Files\7-Zip\Lang\sw.txt 7z2201-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2201-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
Processes:
7z2201-x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2201-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2201-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2201-x64.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2012 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
svchost.exe7zFM.exedescription pid process Token: SeManageVolumePrivilege 1948 svchost.exe Token: SeRestorePrivilege 2012 7zFM.exe Token: 35 2012 7zFM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"1⤵
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\7-Zip\7-zip.dllFilesize
92KB
MD5c3af132ea025d289ab4841fc00bb74af
SHA10a9973d5234cc55b8b97bbb82c722b910c71cbaf
SHA25656b1148a7f96f730d7085f90cadda4980d31cad527d776545c5223466f9ffb52
SHA512707097953d876fa8f25bfefb19bfb3af402b8a6a5d5c35a2d84282818df4466feba63b6401b9b9f11468a2189dcc7f504c51e4590a5e32e635eb4f5710fd80b2
-
C:\Program Files\7-Zip\7zFM.exeFilesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
C:\Program Files\7-Zip\7zFM.exeFilesize
935KB
MD5d36deceeb4c9645aab2ded86608d090b
SHA1912f4658c4b046fbadd084912f9126cb1ae3737b
SHA256018d74ff917692124dee0a8a7e6302aecd219d79b049ad95f2f4eedea41b4a45
SHA5129752a9e57dd2e6cd454ba6c2d041d884369734c2b62c53d3ec4854731c398cd6e25ac75f7a55cda9d4b4c2efb074cb2e6efcbf3080cd8cc7d9bc8c9a25f62ff2
-
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfmFilesize
16KB
MD531b11005764263213c23361c327e2d42
SHA1e3454313e9bad4de2777befd4825cf37dd5fb9eb
SHA25612f3dc20f33c907fed2b5bd8a86128b034fd5251f1c8ef74ce6c4fafbb5740f9
SHA512859ae9213e92b1ce518afc41b97cf6cdfb4ea01ecf1927ab57ed76f755a8b4c446f7c8f9a3e52a6ccb67d54b034269fe19f91e1a327b2033996dff8bb148937d
-
memory/1948-388-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-398-0x000002D3F0980000-0x000002D3F0981000-memory.dmpFilesize
4KB
-
memory/1948-352-0x000002D3E8640000-0x000002D3E8650000-memory.dmpFilesize
64KB
-
memory/1948-389-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-390-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-391-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-392-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-393-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-394-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-396-0x000002D3F0970000-0x000002D3F0971000-memory.dmpFilesize
4KB
-
memory/1948-395-0x000002D3F0980000-0x000002D3F0981000-memory.dmpFilesize
4KB
-
memory/1948-387-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-401-0x000002D3F0970000-0x000002D3F0971000-memory.dmpFilesize
4KB
-
memory/1948-404-0x000002D3F08B0000-0x000002D3F08B1000-memory.dmpFilesize
4KB
-
memory/1948-386-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-416-0x000002D3F0AB0000-0x000002D3F0AB1000-memory.dmpFilesize
4KB
-
memory/1948-418-0x000002D3F0AC0000-0x000002D3F0AC1000-memory.dmpFilesize
4KB
-
memory/1948-419-0x000002D3F0AC0000-0x000002D3F0AC1000-memory.dmpFilesize
4KB
-
memory/1948-420-0x000002D3F0BD0000-0x000002D3F0BD1000-memory.dmpFilesize
4KB
-
memory/1948-385-0x000002D3F0D50000-0x000002D3F0D51000-memory.dmpFilesize
4KB
-
memory/1948-384-0x000002D3F0D30000-0x000002D3F0D31000-memory.dmpFilesize
4KB
-
memory/1948-368-0x000002D3E8740000-0x000002D3E8750000-memory.dmpFilesize
64KB