General
-
Target
Seven.zip
-
Size
1.1MB
-
Sample
240429-n8ybnaad6v
-
MD5
692c82e4cfcadc4ca37d3f65d9b316bb
-
SHA1
7e8387172e858add17b40e63c7bb49837b675a61
-
SHA256
65e2102fcff7b912144aa217886a37a6b0f69c4c79be5c5ac286ea75d60f624e
-
SHA512
79f760d98841836287e2c59cc38589f830c85b1f6c7eada7fd993438bbe012cbe65f6b808cd6df4ab83225e059914e2b693cfe31c43ad9f636258b70ec1464d5
-
SSDEEP
24576:yFwVInYbchlithQ1GH8pYUjVvl+uf4+RKOeL+VH04vDUH:yynw4/H0YUfjf4mKOeiml
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
Seven.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
Seven.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
Seven.dll
-
Size
1.0MB
-
MD5
d04365e7e8c75d762fe957fed1567250
-
SHA1
002612ecc3a639af74ce1ddd0e2dc4ddc23c0253
-
SHA256
2ba7535cdd2adf5eab33c8689269f839bd79cc5346bd9d0b138f18717bc69e3d
-
SHA512
995a31332dd35f6b8de2e2cb51bb097c523cd6d7936c84bb9423fc384b820fb63134e4a7d93c9dbbe80f8b90eab61e38fdb2c006b27b57767292f5fa8788686f
-
SSDEEP
24576:D5A5tpj7cnfi5LQrG1W/gUjVnlYuRE+VKuynOlP0Ubqm:DIrQ6X1GgUzxREcKuyOe7
Score1/10 -
-
-
Target
Seven.exe
-
Size
139KB
-
MD5
6503f847c3281ff85b304fc674b62580
-
SHA1
947536e0741c085f37557b7328b067ef97cb1a61
-
SHA256
afd7657f941024ef69ca34d1e61e640c5523b19b0fad4dcb1c9f1b01a6fa166f
-
SHA512
abc3b32a1cd7d0a60dd7354a9fcdff0bc37ec8a20bb2a8258353716d820f62d343c6ba9385ba893be0cca981bbb9ab4e189ccfeee6dd77cc0dc723e975532174
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8lto:miS4ompB9S3BZi0a1G78IVhcTct
Score10/10-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1