Analysis
-
max time kernel
42s -
max time network
51s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
17-11-2023 12:54
Static task
static1
Behavioral task
behavioral1
Sample
7ev3n.exe
Resource
win10-20231023-en
Errors
General
-
Target
7ev3n.exe
-
Size
315KB
-
MD5
9f8bc96c96d43ecb69f883388d228754
-
SHA1
61ed25a706afa2f6684bb4d64f69c5fb29d20953
-
SHA256
7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
-
SHA512
550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
SSDEEP
6144:BswDdb2MemnBVlz0SoVbO4A6OA4Trl28TyT6llY1/I8cWJWlfTXv:BswRSslz0P1OdFXJlJ8buXv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 4144 system.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1052 SCHTASKS.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5052 shutdown.exe Token: SeRemoteShutdownPrivilege 5052 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1180 LogonUI.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4144 4240 7ev3n.exe 71 PID 4240 wrote to memory of 4144 4240 7ev3n.exe 71 PID 4240 wrote to memory of 4144 4240 7ev3n.exe 71 PID 4144 wrote to memory of 2324 4144 system.exe 72 PID 4144 wrote to memory of 2324 4144 system.exe 72 PID 4144 wrote to memory of 2324 4144 system.exe 72 PID 4144 wrote to memory of 1052 4144 system.exe 73 PID 4144 wrote to memory of 1052 4144 system.exe 73 PID 4144 wrote to memory of 1052 4144 system.exe 73 PID 4144 wrote to memory of 4528 4144 system.exe 76 PID 4144 wrote to memory of 4528 4144 system.exe 76 PID 4144 wrote to memory of 4528 4144 system.exe 76 PID 4144 wrote to memory of 1648 4144 system.exe 77 PID 4144 wrote to memory of 1648 4144 system.exe 77 PID 4144 wrote to memory of 1648 4144 system.exe 77 PID 4144 wrote to memory of 3812 4144 system.exe 85 PID 4144 wrote to memory of 3812 4144 system.exe 85 PID 4144 wrote to memory of 3812 4144 system.exe 85 PID 4144 wrote to memory of 3780 4144 system.exe 82 PID 4144 wrote to memory of 3780 4144 system.exe 82 PID 4144 wrote to memory of 3780 4144 system.exe 82 PID 4144 wrote to memory of 3708 4144 system.exe 81 PID 4144 wrote to memory of 3708 4144 system.exe 81 PID 4144 wrote to memory of 3708 4144 system.exe 81 PID 4144 wrote to memory of 2716 4144 system.exe 80 PID 4144 wrote to memory of 2716 4144 system.exe 80 PID 4144 wrote to memory of 2716 4144 system.exe 80 PID 3708 wrote to memory of 1560 3708 cmd.exe 88 PID 3708 wrote to memory of 1560 3708 cmd.exe 88 PID 3708 wrote to memory of 1560 3708 cmd.exe 88 PID 3780 wrote to memory of 2112 3780 cmd.exe 93 PID 3780 wrote to memory of 2112 3780 cmd.exe 93 PID 3780 wrote to memory of 2112 3780 cmd.exe 93 PID 1648 wrote to memory of 4556 1648 cmd.exe 92 PID 1648 wrote to memory of 4556 1648 cmd.exe 92 PID 1648 wrote to memory of 4556 1648 cmd.exe 92 PID 2716 wrote to memory of 4616 2716 cmd.exe 89 PID 2716 wrote to memory of 4616 2716 cmd.exe 89 PID 2716 wrote to memory of 4616 2716 cmd.exe 89 PID 3812 wrote to memory of 3440 3812 cmd.exe 91 PID 3812 wrote to memory of 3440 3812 cmd.exe 91 PID 3812 wrote to memory of 3440 3812 cmd.exe 91 PID 4528 wrote to memory of 4296 4528 cmd.exe 90 PID 4528 wrote to memory of 4296 4528 cmd.exe 90 PID 4528 wrote to memory of 4296 4528 cmd.exe 90 PID 4144 wrote to memory of 3968 4144 system.exe 95 PID 4144 wrote to memory of 3968 4144 system.exe 95 PID 4144 wrote to memory of 3968 4144 system.exe 95 PID 3968 wrote to memory of 1836 3968 cmd.exe 97 PID 3968 wrote to memory of 1836 3968 cmd.exe 97 PID 3968 wrote to memory of 1836 3968 cmd.exe 97 PID 4144 wrote to memory of 2644 4144 system.exe 98 PID 4144 wrote to memory of 2644 4144 system.exe 98 PID 4144 wrote to memory of 2644 4144 system.exe 98 PID 2644 wrote to memory of 5052 2644 cmd.exe 100 PID 2644 wrote to memory of 5052 2644 cmd.exe 100 PID 2644 wrote to memory of 5052 2644 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ev3n.exe"C:\Users\Admin\AppData\Local\Temp\7ev3n.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat3⤵PID:2324
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1052
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Modifies WinLogon for persistence
PID:4296
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Adds Run key to start application
PID:4556
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- UAC bypass
PID:4616
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵PID:1560
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵PID:2112
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵PID:3440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:644⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f3⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 10 -f4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ae6055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65B
MD5f727ee128a7eeb23b9c3242b049e61ef
SHA1a260ee1e7c05377830130163737c7609598d61ee
SHA25698bfdb556f8e8a2564cadfd0c62fff7b81b3a70a4f7e03a86f704fabd5d3c884
SHA512c59a537dbd2349d0f29b6596d35c387fbb76a2cde16fddee04c3d861221c2a7a9ef1af67577a63a80523ec4fc079cc64090e3e86544730bf9cdac2ca122a9c0e
-
Filesize
315KB
MD583d3f5dd79f3e8f9253c42a5d7bd4635
SHA1359ed5b78b06dd3d9259a2e9643e640a8bd201b4
SHA256bec73642db3e2d424c3d7ec4d62c8038f1ca3390e69199adfd41afb18c17d1a4
SHA512d207436ee23090c3d00486f779d03f257c3051ee2f146446c8e4b68e254ea6880733615addda64afa1ded34feacc249f4b5fc1ae58c9286fed84a824f1d547e9
-
Filesize
315KB
MD583d3f5dd79f3e8f9253c42a5d7bd4635
SHA1359ed5b78b06dd3d9259a2e9643e640a8bd201b4
SHA256bec73642db3e2d424c3d7ec4d62c8038f1ca3390e69199adfd41afb18c17d1a4
SHA512d207436ee23090c3d00486f779d03f257c3051ee2f146446c8e4b68e254ea6880733615addda64afa1ded34feacc249f4b5fc1ae58c9286fed84a824f1d547e9