General

  • Target

    Seven.zip

  • Size

    1.1MB

  • Sample

    240428-bc3v2scd64

  • MD5

    40b6089d80acd6d4eafed95f8d653734

  • SHA1

    2be0b3a8bbb779edda6ad22a83f1dc4d953a8de3

  • SHA256

    142f8fecf05ca0d7df6e730f8a9d7c87ff433975e9367417bd54ee26a06f34d2

  • SHA512

    1b24d7d5c48474a2adaa6a267a55ef2aa53f8d781e2df22ae4b14faee99dfa6a4546874a0e3467f4b8e27e8d343ab904c096e650565e311c17368ee15b374846

  • SSDEEP

    24576:XBCA50/lE2aSb94i95Oh9VWJgqB7fl8udeUhEqdorXjWIn6gBSqeb:Xnut99U/wgqTfdexQoDqtb

Malware Config

Targets

    • Target

      Seven.dll

    • Size

      1.0MB

    • MD5

      34b7b20b414600005d1cc16a9bbb4440

    • SHA1

      34880b030c79aa060670c1974ee3a53e334829f0

    • SHA256

      08ba79e0f267e6ed47b066cfb7596a87951707b1d091c39fd3f4ac281fb99026

    • SHA512

      cbb9f8fae699ec048126a021e5bb6525ed513707f81f3b15f43a6278fcd3b3f817e3cec9eee7f005abc12878aa26ebfda825289fbd5fb6db75ecf3a2e349bd38

    • SSDEEP

      24576:rAiJqEAwab98iF5IhDDWDwqj7tloudYchE0TCX3J+Al8algrmP:499dCXewqrDdY54CHgK

    Score
    1/10
    • Target

      Seven.exe

    • Size

      139KB

    • MD5

      6503f847c3281ff85b304fc674b62580

    • SHA1

      947536e0741c085f37557b7328b067ef97cb1a61

    • SHA256

      afd7657f941024ef69ca34d1e61e640c5523b19b0fad4dcb1c9f1b01a6fa166f

    • SHA512

      abc3b32a1cd7d0a60dd7354a9fcdff0bc37ec8a20bb2a8258353716d820f62d343c6ba9385ba893be0cca981bbb9ab4e189ccfeee6dd77cc0dc723e975532174

    • SSDEEP

      3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8lto:miS4ompB9S3BZi0a1G78IVhcTct

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

4
T1112

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks