General
-
Target
Seven.zip
-
Size
1.4MB
-
Sample
240430-bglgkafg33
-
MD5
bdf74348cb0d18ad1eb6c15bdb6a6340
-
SHA1
10659b2352dc66c85d86475a74d2a663ec3b50a4
-
SHA256
46b11a3a4566f2500ef0c18da7896aa3ed55c7fa189a867f7b0ba7f2558f8e93
-
SHA512
9674060b25bb2055a1d31a4eeeb934ea782ad768012afaa8d9b1ef423b8b3c8672176e9530bcb90fc90136004d07a862d9f53f068639675782b30598ab4ab030
-
SSDEEP
24576:V9SRIGmHUqjBDlMoHW1W8x0LhUJFvke9gvddVUXYUcsLTklYU9qoZyiFTvMGWDrA:V9SRGHUqfpHW1WtUN9glYLTkuU9qoZ/n
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
Seven.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Seven.dll
-
Size
1.3MB
-
MD5
e3efaf5cbea6c37a31c25f83754b90dd
-
SHA1
ee2a8a59f4b81470ed61bd5721fd6452b29b3a85
-
SHA256
97bba47d5f89e3231e13066894c0b91e335be042b2ceb7047298dcec556ef81d
-
SHA512
f1faf5329d1d7c9499c49d4fdc3bb83a854d2eec791a3f3e3a70a74c3031aed665b1ce63707e3a56ac7cdd77ad54679c9f2edd4c646dd7f0e50f7ec94ec63e93
-
SSDEEP
24576:wih2imlCqjV/l4uHc1WEL0LFqXF36GFMvTTVuJ66ggh3yjYUUyqcdygtTzoqWZb:wihqlCq7RHc1WdqRFMbQh3y0Ubqcdv8q
Score1/10 -
-
-
Target
Seven.exe
-
Size
139KB
-
MD5
350273e0d2e8a9ba5e37b791016112a0
-
SHA1
5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
-
SHA256
27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
-
SHA512
b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct
Score10/10-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1