General
-
Target
Seven.zip
-
Size
1.4MB
-
Sample
240430-b9dx7ahd8t
-
MD5
eef3fc9d2970111c2f8942808768525f
-
SHA1
cf669960036c308a9ac048e6a34e7555c0398974
-
SHA256
10d115db8fdb69852e7c096c92d9c3413d15dcc0359cfac8764f434be5c4d248
-
SHA512
14d19f86cc1eff9dea8a10f01f3f99ffaa7d84d7ff5cfb6ff9b254ba64f01aff5439452e6c26bc72a28143429d81edbf38a208f969ac7f8e027441f5811a8da9
-
SSDEEP
24576:U/gLO/mkBIqj77lEublvu47FV/jevCZtVkhGTYKmK/M4GYGEyLspnQWD/GUM:GgLGBIqRHblvu4njeqh/5G1EykQSG3
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win11-20240419-en
Malware Config
Targets
-
-
Target
Seven.dll
-
Size
1.3MB
-
MD5
45468689f5b2c655251b9f44342dc067
-
SHA1
00b6e0b89cb406f720c397e17c0bb729a2b21e7f
-
SHA256
75fbeb58b96447dcdad43ec8b81f4e96b97d3f74cfea61d3a91fda158b75b307
-
SHA512
632c26b7f705b1e282652e2ada7f4aa7f550a24c9e3406ab28edb6cef7eb52a0529a5a494b7a62360e289f5ddf26e67a16e25892f190c92c563f3b0f7cfae2df
-
SSDEEP
24576:7bOc5CTiklkqjVxlYubf7qeJFzBlKv0jTV0BwT6uiglckGUyEc1C7niWHDG/b:uc5mlkq9xbf7qellKwdl5GHEcai0G
Score1/10 -
-
-
Target
Seven.exe
-
Size
139KB
-
MD5
350273e0d2e8a9ba5e37b791016112a0
-
SHA1
5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
-
SHA256
27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
-
SHA512
b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct
Score10/10-
Renames multiple (233) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1