Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
SevenRedCodeDotnet.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
SevenRedCodeDotnet.exe
Resource
win11-20240426-en
General
-
Target
SevenRedCodeDotnet.exe
-
Size
29KB
-
MD5
a76a84cb42da8c34121ce67690cf7ab7
-
SHA1
55fd18ec3bcb3cb7d88e6f30a6c9227d583cc238
-
SHA256
1043d01d6b38dead9d9abbf311564f29e514603af384ddc57ca01a1c789caeb6
-
SHA512
24d8e3cc87b84453cef44db2fe40e96287c9ddd195d0a5be01ff4cdc26ac90b3b9fa961dd377fd09f66a99c8f3e47cd680ba8c63120aff4214769c871eed980c
-
SSDEEP
384:LKHg4EqSxX9D9k2D8YgRzbjvCcyorF6HgrvkjvcK5MXqAYiDNBxQWz+vEJweg2A5:WA19RD8ZRb3L0mNJcEJ1gWq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SevenRedCodeDotnet.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Doofus.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Doofus.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Doofus.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 652 SevenRedCodeDotnet.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 652 wrote to memory of 2500 652 SevenRedCodeDotnet.exe 84 PID 652 wrote to memory of 2500 652 SevenRedCodeDotnet.exe 84 PID 652 wrote to memory of 2500 652 SevenRedCodeDotnet.exe 84 PID 652 wrote to memory of 1424 652 SevenRedCodeDotnet.exe 86 PID 652 wrote to memory of 1424 652 SevenRedCodeDotnet.exe 86 PID 652 wrote to memory of 1424 652 SevenRedCodeDotnet.exe 86 PID 652 wrote to memory of 224 652 SevenRedCodeDotnet.exe 87 PID 652 wrote to memory of 224 652 SevenRedCodeDotnet.exe 87 PID 652 wrote to memory of 224 652 SevenRedCodeDotnet.exe 87 PID 652 wrote to memory of 1552 652 SevenRedCodeDotnet.exe 88 PID 652 wrote to memory of 1552 652 SevenRedCodeDotnet.exe 88 PID 652 wrote to memory of 1552 652 SevenRedCodeDotnet.exe 88 PID 652 wrote to memory of 1704 652 SevenRedCodeDotnet.exe 89 PID 652 wrote to memory of 1704 652 SevenRedCodeDotnet.exe 89 PID 652 wrote to memory of 1704 652 SevenRedCodeDotnet.exe 89 PID 652 wrote to memory of 2892 652 SevenRedCodeDotnet.exe 90 PID 652 wrote to memory of 2892 652 SevenRedCodeDotnet.exe 90 PID 652 wrote to memory of 2892 652 SevenRedCodeDotnet.exe 90 PID 652 wrote to memory of 2288 652 SevenRedCodeDotnet.exe 91 PID 652 wrote to memory of 2288 652 SevenRedCodeDotnet.exe 91 PID 652 wrote to memory of 2288 652 SevenRedCodeDotnet.exe 91 PID 2288 wrote to memory of 396 2288 cmd.exe 98 PID 2288 wrote to memory of 396 2288 cmd.exe 98 PID 2288 wrote to memory of 396 2288 cmd.exe 98 PID 224 wrote to memory of 3724 224 cmd.exe 99 PID 224 wrote to memory of 3724 224 cmd.exe 99 PID 224 wrote to memory of 3724 224 cmd.exe 99 PID 1552 wrote to memory of 1668 1552 cmd.exe 100 PID 1552 wrote to memory of 1668 1552 cmd.exe 100 PID 1552 wrote to memory of 1668 1552 cmd.exe 100 PID 2892 wrote to memory of 2868 2892 cmd.exe 101 PID 2892 wrote to memory of 2868 2892 cmd.exe 101 PID 2892 wrote to memory of 2868 2892 cmd.exe 101 PID 652 wrote to memory of 2292 652 SevenRedCodeDotnet.exe 102 PID 652 wrote to memory of 2292 652 SevenRedCodeDotnet.exe 102 PID 652 wrote to memory of 2292 652 SevenRedCodeDotnet.exe 102 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3724 attrib.exe 396 attrib.exe 1668 attrib.exe 2868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Windows\System32\Doofus.exe2⤵
- Drops file in System32 directory
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Users\Public\Documents\Doofus.exe2⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\Doofus.exe3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:3724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\Doofus.exe3⤵
- Views/modifies file attributes
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRecode.exe C:\Windows\System32\SevenRecode.exe2⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:396
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "SevenRecode" /tr "C:\Windows\System32\Doofus.exe" /sc minute /mo 1 /rl highest /f2⤵
- Creates scheduled task(s)
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5a76a84cb42da8c34121ce67690cf7ab7
SHA155fd18ec3bcb3cb7d88e6f30a6c9227d583cc238
SHA2561043d01d6b38dead9d9abbf311564f29e514603af384ddc57ca01a1c789caeb6
SHA51224d8e3cc87b84453cef44db2fe40e96287c9ddd195d0a5be01ff4cdc26ac90b3b9fa961dd377fd09f66a99c8f3e47cd680ba8c63120aff4214769c871eed980c