General

  • Target

    Seven.zip

  • Size

    1.1MB

  • Sample

    240429-gmx1facb53

  • MD5

    4ef284f847cc2ae35545ed6f8be693e9

  • SHA1

    f8fad8e4d9c93842238e0b338aa9bce7774ab335

  • SHA256

    2eb68b454b3e6dfafc1615b71c52d29dd78052a1583a12eeaf26a63a4dd19796

  • SHA512

    234dab4134a17feb2a25cde50ecb3bb11e036c7952db911ae368bd5959d2d044f5c376027e7a598f5eb699dae7a9c52021220cb9176db8cdd32705bc59c245ad

  • SSDEEP

    24576:+0gECY4cgi35sHjf5+W9sqj3/lkEdslBtU/6c7N5yyrBbcAHVC6Mui:h4cruf5+YsqpTdslDUyc7NIyrC0qn

Malware Config

Targets

    • Target

      Seven.dll

    • Size

      1.0MB

    • MD5

      a6c5b34d4815b721ca059167e833c41f

    • SHA1

      47bbba37c02a507653a16e8695942525f6ae2f75

    • SHA256

      5a76532a392572bdc34958185c923e4f171b335f92e886927ee47854069f5e1b

    • SHA512

      9be386142dc04bdb465de0681d956f7332d38cac14907f941ddadb804b83cb78c88d2f36a20a381d74aec9ac9be2b67d3a709b5ed422c1a0f2f173fee172aa01

    • SSDEEP

      24576:q5A5tp2WOqgi55MHxf5SWBMqj9PleGdqrpBUlWu715AyrBfcAnxMY7:qIjOqFWf5SoMqDtdqrvUYu71iyreGD

    Score
    1/10
    • Target

      Seven.exe

    • Size

      139KB

    • MD5

      6503f847c3281ff85b304fc674b62580

    • SHA1

      947536e0741c085f37557b7328b067ef97cb1a61

    • SHA256

      afd7657f941024ef69ca34d1e61e640c5523b19b0fad4dcb1c9f1b01a6fa166f

    • SHA512

      abc3b32a1cd7d0a60dd7354a9fcdff0bc37ec8a20bb2a8258353716d820f62d343c6ba9385ba893be0cca981bbb9ab4e189ccfeee6dd77cc0dc723e975532174

    • SSDEEP

      3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8lto:miS4ompB9S3BZi0a1G78IVhcTct

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks