General
-
Target
Seven.zip
-
Size
1.4MB
-
Sample
240429-x39beaag52
-
MD5
701bf6f2f0ba052c1c37c106b78e4a65
-
SHA1
a26a521a4bc4f5d20f85fba3cb860c0724264404
-
SHA256
5ccb5751f770c5cd838eb65b48782be541cb775ed2951128671e9cb4d9ec1c83
-
SHA512
076c27498fdd1b085094d72eb0fa510c6bac298e3f6de138c2a8c2991288d2f018e5b5c215c8e5712467770b8bf0794ecebff9ecb22f42cfc76cfeecd1edecc6
-
SSDEEP
24576:PbK8DeW9xco1tv65yqj5nl00JMs+zuoJr7x8Pvv4FsAPp4YIIuWoYKUIUUkAFMT6:jKmv1BayqLFJMs7o0PvAdDlHK1UUZ
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
Seven.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
Seven.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
Seven.dll
-
Size
1.3MB
-
MD5
c3438e39ddf1bbc1c755e92da66e24b7
-
SHA1
c3424230f98ba36be3b0caa32735ac0244ff9fdb
-
SHA256
7fb37094230463fa5afe4c5c020cd3d6e0f823586badd6b84d6baf8f84bb1a1d
-
SHA512
07c6723dbeda372b769eb377738bc1f6376ac93dbee557fcad2e2f75fdd267662fd201d424d4809e7456dc6c481979ef91a56c38df153a83bc09f8c919f3142a
-
SSDEEP
24576:1mqC3iWX5Sy1LlW/4qj5hlc0dK8Y9YcHrTJcrjvgFywNN4aII+8aYqUiUcUYZsP:1mqkJnRG4qpddK8vcirjIHNVrqxUc
Score1/10 -
-
-
Target
Seven.exe
-
Size
139KB
-
MD5
350273e0d2e8a9ba5e37b791016112a0
-
SHA1
5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
-
SHA256
27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
-
SHA512
b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct
Score10/10-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1