Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
Seven.exe
Resource
win10v2004-20240426-en
General
-
Target
Seven.exe
-
Size
139KB
-
MD5
350273e0d2e8a9ba5e37b791016112a0
-
SHA1
5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
-
SHA256
27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
-
SHA512
b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Seven.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Seven.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "1" Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "1" Seven.exe -
Blocks application from running via registry modification 1 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Seven.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Seven.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" Seven.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Seven.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" Seven.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "1" Seven.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 2 raw.githubusercontent.com -
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\System32\Seven.runtimeconfig.json cmd.exe File opened for modification C:\Windows\System32\Seven.dll cmd.exe File opened for modification C:\Windows\System32\Desktop cmd.exe File opened for modification C:\Windows\System32\Desktop attrib.exe File opened for modification C:\Windows\System32\Desktop attrib.exe File opened for modification C:\Windows\System32\Winhost cmd.exe File opened for modification C:\Windows\System32\Seven.runtimeconfig.json cmd.exe File created C:\Windows\System32\Seven.dll cmd.exe File opened for modification C:\Windows\System32\Seven.dll attrib.exe File created C:\Windows\System32\Desktop cmd.exe File opened for modification C:\Windows\System32\Desktop attrib.exe File opened for modification C:\Windows\System32\Desktop cmd.exe File created C:\Windows\System32\Winhost cmd.exe File opened for modification C:\Windows\System32\Desktop cmd.exe File created C:\Windows\System32\Desktop cmd.exe File created C:\Windows\System32\Desktop cmd.exe File opened for modification C:\Windows\System32\Winhost attrib.exe File opened for modification C:\Windows\System32\Seven.runtimeconfig.json attrib.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 powershell.exe 1508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2140 2452 Seven.exe 85 PID 2452 wrote to memory of 2140 2452 Seven.exe 85 PID 2452 wrote to memory of 1484 2452 Seven.exe 86 PID 2452 wrote to memory of 1484 2452 Seven.exe 86 PID 2452 wrote to memory of 1532 2452 Seven.exe 87 PID 2452 wrote to memory of 1532 2452 Seven.exe 87 PID 2452 wrote to memory of 1236 2452 Seven.exe 88 PID 2452 wrote to memory of 1236 2452 Seven.exe 88 PID 2452 wrote to memory of 3284 2452 Seven.exe 89 PID 2452 wrote to memory of 3284 2452 Seven.exe 89 PID 2452 wrote to memory of 3288 2452 Seven.exe 90 PID 2452 wrote to memory of 3288 2452 Seven.exe 90 PID 2452 wrote to memory of 2300 2452 Seven.exe 91 PID 2452 wrote to memory of 2300 2452 Seven.exe 91 PID 2452 wrote to memory of 1824 2452 Seven.exe 92 PID 2452 wrote to memory of 1824 2452 Seven.exe 92 PID 2452 wrote to memory of 1916 2452 Seven.exe 93 PID 2452 wrote to memory of 1916 2452 Seven.exe 93 PID 2452 wrote to memory of 1088 2452 Seven.exe 94 PID 2452 wrote to memory of 1088 2452 Seven.exe 94 PID 2452 wrote to memory of 3032 2452 Seven.exe 95 PID 2452 wrote to memory of 3032 2452 Seven.exe 95 PID 2452 wrote to memory of 3948 2452 Seven.exe 96 PID 2452 wrote to memory of 3948 2452 Seven.exe 96 PID 3948 wrote to memory of 2340 3948 cmd.exe 97 PID 3948 wrote to memory of 2340 3948 cmd.exe 97 PID 1088 wrote to memory of 2060 1088 cmd.exe 98 PID 1088 wrote to memory of 2060 1088 cmd.exe 98 PID 3032 wrote to memory of 4596 3032 cmd.exe 99 PID 3032 wrote to memory of 4596 3032 cmd.exe 99 PID 1236 wrote to memory of 4724 1236 cmd.exe 101 PID 1236 wrote to memory of 4724 1236 cmd.exe 101 PID 1916 wrote to memory of 892 1916 cmd.exe 100 PID 1916 wrote to memory of 892 1916 cmd.exe 100 PID 1532 wrote to memory of 4872 1532 cmd.exe 102 PID 1532 wrote to memory of 4872 1532 cmd.exe 102 PID 2452 wrote to memory of 1508 2452 Seven.exe 104 PID 2452 wrote to memory of 1508 2452 Seven.exe 104 PID 2452 wrote to memory of 3252 2452 Seven.exe 106 PID 2452 wrote to memory of 3252 2452 Seven.exe 106 PID 2452 wrote to memory of 2236 2452 Seven.exe 107 PID 2452 wrote to memory of 2236 2452 Seven.exe 107 PID 2452 wrote to memory of 4728 2452 Seven.exe 108 PID 2452 wrote to memory of 4728 2452 Seven.exe 108 PID 2452 wrote to memory of 2080 2452 Seven.exe 109 PID 2452 wrote to memory of 2080 2452 Seven.exe 109 PID 2452 wrote to memory of 4052 2452 Seven.exe 110 PID 2452 wrote to memory of 4052 2452 Seven.exe 110 PID 2452 wrote to memory of 1324 2452 Seven.exe 111 PID 2452 wrote to memory of 1324 2452 Seven.exe 111 PID 2452 wrote to memory of 1152 2452 Seven.exe 112 PID 2452 wrote to memory of 1152 2452 Seven.exe 112 PID 2452 wrote to memory of 2176 2452 Seven.exe 113 PID 2452 wrote to memory of 2176 2452 Seven.exe 113 PID 2452 wrote to memory of 1412 2452 Seven.exe 114 PID 2452 wrote to memory of 1412 2452 Seven.exe 114 PID 2452 wrote to memory of 1684 2452 Seven.exe 115 PID 2452 wrote to memory of 1684 2452 Seven.exe 115 PID 2452 wrote to memory of 4224 2452 Seven.exe 116 PID 2452 wrote to memory of 4224 2452 Seven.exe 116 PID 2452 wrote to memory of 904 2452 Seven.exe 117 PID 2452 wrote to memory of 904 2452 Seven.exe 117 PID 904 wrote to memory of 3648 904 cmd.exe 118 PID 904 wrote to memory of 3648 904 cmd.exe 118 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "1" Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Seven.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "1" Seven.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 12 IoCs
pid Process 2340 attrib.exe 3648 attrib.exe 2268 attrib.exe 2012 attrib.exe 1460 attrib.exe 2288 attrib.exe 544 attrib.exe 2060 attrib.exe 4596 attrib.exe 4724 attrib.exe 4872 attrib.exe 892 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Seven.exe"C:\Users\Admin\AppData\Local\Temp\Seven.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2452 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.exe C:\Windows\System32\Winhost2⤵
- Drops file in System32 directory
PID:2140
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.exe C:\Users\Public\Documents\Winhost2⤵PID:1484
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Winhost2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Winhost3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:4872
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Winhost2⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Winhost3⤵
- Views/modifies file attributes
PID:4724
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.dll C:\Windows\System32\Seven.dll2⤵
- Drops file in System32 directory
PID:3284
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.dll C:\Users\Public\Documents\Seven.dll2⤵PID:3288
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.runtimeconfig.json C:\Windows\System32\Seven.runtimeconfig.json2⤵
- Drops file in System32 directory
PID:2300
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\Seven.runtimeconfig.json C:\Users\Public\Documents\Seven.runtimeconfig.json2⤵PID:1824
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Seven.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Seven.dll3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:892
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Seven.runtimeconfig.json2⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Seven.runtimeconfig.json3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2060
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Seven.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Seven.dll3⤵
- Views/modifies file attributes
PID:4596
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Seven.runtimeconfig.json2⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Seven.runtimeconfig.json3⤵
- Views/modifies file attributes
PID:2340
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Windows\System32\Desktop2⤵
- Drops file in System32 directory
PID:3252
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Users\Public\Documents\Desktop2⤵PID:2236
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Desktop2⤵PID:4728
-
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Desktop3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1460
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Desktop2⤵PID:2080
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Desktop3⤵
- Views/modifies file attributes
PID:2012
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Windows\System32\Desktop2⤵
- Drops file in System32 directory
PID:4052
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Users\Public\Documents\Desktop2⤵PID:1324
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Windows\System32\Desktop2⤵
- Drops file in System32 directory
PID:1152
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy C:\Users\Admin\Desktop C:\Users\Public\Documents\Desktop2⤵PID:2176
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Desktop2⤵PID:1412
-
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Desktop3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2268
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Desktop2⤵PID:1684
-
C:\Windows\system32\attrib.exeattrib +h C:\Windows\System32\Desktop3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:544
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Desktop2⤵PID:4224
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Desktop3⤵
- Views/modifies file attributes
PID:2288
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Desktop2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Public\Documents\Desktop3⤵
- Views/modifies file attributes
PID:3648
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5fd57ee9da9fd49cf17ea66a2c390480f
SHA10393450fc7d614d29dace94969ac07bbbd8afd60
SHA2560f44491fa7bfe284e00adb674b1b2d559ef3465e496ba42dc86bbcab13db346f
SHA51211d07fa90a38a6200fd17801b56ab673c9ec54167d339195589d737e5f89b189c260203113f50e61366a72bb594563394a37ad31a0d4ed6440360da01ad3b31e
-
Filesize
1KB
MD544af0918514a0f3ffae76847ec058270
SHA1455d0dde1308973c4215dc11e77157eaeaf0b89b
SHA256f61e9538e7278b651cf227edca7c32ddead0db2924e4835cc50f7eecafddba06
SHA512859b2bacbc2ba031d82c14ff138781648e506bb307945248d28ec932e0608362a1486ad182f961a340fc5760144a1415bf76a62278369f7380643944378fe894
-
Filesize
1KB
MD51830f8464ef956c1ef8877944c021c78
SHA1b3e8d5100d87e6cd456eaeb2c8d939e979c131dc
SHA256988e5c50f551d07fa2f67e65eae2ca14c018f220481fe407e6297a8dcb1d2d63
SHA5128d921ad31fd8afe34b7f6c86ecf522935e41fd7cfca785ffc6e56b824ef37e9ae13577260801d4f6fe40a573f88f7723a074af2a38dc91257f8a20d6a92ec8fc
-
Filesize
1.0MB
MD55c684b9229a0bb82b31c7e17cb0496c7
SHA1a141f6f33f9b766a91fb3bc0248be0e3e3373747
SHA256ba4a5dd2f126de491b60e4cb899319688c1b1308efddad0d550fcee87b24258a
SHA5127a477c23b9c345253f2f8581868a72e54ce980e665c841af6795428860103e0d8440a7a047538a2bff5b7ac43f1cf06b4c3b52074fd72d5b378bed75755a1955
-
Filesize
340B
MD5253333997e82f7d44ea8072dfae6db39
SHA103b9744e89327431a619505a7c72fd497783d884
SHA25628329cf08f6505e73806b17558b187c02f0c1c516fe47ebfb7a013d082aaa306
SHA51256d99039e0fb6305588e9f87361e7e0d5051507bf321ba36619c4d29741f35c27c62f025a52523c9e1c7287aabf1533444330a8cdf840fa5af0fa2241fcb4fc2
-
Filesize
139KB
MD5350273e0d2e8a9ba5e37b791016112a0
SHA15bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
SHA25627297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
SHA512b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b