Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/05/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
SevenRedCodeDotnet.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
SevenRedCodeDotnet.exe
Resource
win11-20240426-en
General
-
Target
SevenRedCodeDotnet.exe
-
Size
29KB
-
MD5
a76a84cb42da8c34121ce67690cf7ab7
-
SHA1
55fd18ec3bcb3cb7d88e6f30a6c9227d583cc238
-
SHA256
1043d01d6b38dead9d9abbf311564f29e514603af384ddc57ca01a1c789caeb6
-
SHA512
24d8e3cc87b84453cef44db2fe40e96287c9ddd195d0a5be01ff4cdc26ac90b3b9fa961dd377fd09f66a99c8f3e47cd680ba8c63120aff4214769c871eed980c
-
SSDEEP
384:LKHg4EqSxX9D9k2D8YgRzbjvCcyorF6HgrvkjvcK5MXqAYiDNBxQWz+vEJweg2A5:WA19RD8ZRb3L0mNJcEJ1gWq
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Doofus.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Doofus.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Doofus.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4500 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 SevenRedCodeDotnet.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2316 1368 SevenRedCodeDotnet.exe 80 PID 1368 wrote to memory of 2316 1368 SevenRedCodeDotnet.exe 80 PID 1368 wrote to memory of 2316 1368 SevenRedCodeDotnet.exe 80 PID 1368 wrote to memory of 3576 1368 SevenRedCodeDotnet.exe 82 PID 1368 wrote to memory of 3576 1368 SevenRedCodeDotnet.exe 82 PID 1368 wrote to memory of 3576 1368 SevenRedCodeDotnet.exe 82 PID 1368 wrote to memory of 1036 1368 SevenRedCodeDotnet.exe 83 PID 1368 wrote to memory of 1036 1368 SevenRedCodeDotnet.exe 83 PID 1368 wrote to memory of 1036 1368 SevenRedCodeDotnet.exe 83 PID 1368 wrote to memory of 1116 1368 SevenRedCodeDotnet.exe 84 PID 1368 wrote to memory of 1116 1368 SevenRedCodeDotnet.exe 84 PID 1368 wrote to memory of 1116 1368 SevenRedCodeDotnet.exe 84 PID 1368 wrote to memory of 3776 1368 SevenRedCodeDotnet.exe 85 PID 1368 wrote to memory of 3776 1368 SevenRedCodeDotnet.exe 85 PID 1368 wrote to memory of 3776 1368 SevenRedCodeDotnet.exe 85 PID 1368 wrote to memory of 4272 1368 SevenRedCodeDotnet.exe 86 PID 1368 wrote to memory of 4272 1368 SevenRedCodeDotnet.exe 86 PID 1368 wrote to memory of 4272 1368 SevenRedCodeDotnet.exe 86 PID 1368 wrote to memory of 664 1368 SevenRedCodeDotnet.exe 87 PID 1368 wrote to memory of 664 1368 SevenRedCodeDotnet.exe 87 PID 1368 wrote to memory of 664 1368 SevenRedCodeDotnet.exe 87 PID 1036 wrote to memory of 1472 1036 cmd.exe 94 PID 1036 wrote to memory of 1472 1036 cmd.exe 94 PID 1036 wrote to memory of 1472 1036 cmd.exe 94 PID 1116 wrote to memory of 1148 1116 cmd.exe 95 PID 1116 wrote to memory of 1148 1116 cmd.exe 95 PID 1116 wrote to memory of 1148 1116 cmd.exe 95 PID 664 wrote to memory of 944 664 cmd.exe 96 PID 664 wrote to memory of 944 664 cmd.exe 96 PID 664 wrote to memory of 944 664 cmd.exe 96 PID 4272 wrote to memory of 868 4272 cmd.exe 97 PID 4272 wrote to memory of 868 4272 cmd.exe 97 PID 4272 wrote to memory of 868 4272 cmd.exe 97 PID 1368 wrote to memory of 4500 1368 SevenRedCodeDotnet.exe 98 PID 1368 wrote to memory of 4500 1368 SevenRedCodeDotnet.exe 98 PID 1368 wrote to memory of 4500 1368 SevenRedCodeDotnet.exe 98 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 1472 attrib.exe 1148 attrib.exe 944 attrib.exe 868 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Windows\System32\Doofus.exe2⤵
- Drops file in System32 directory
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Users\Public\Documents\Doofus.exe2⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\Doofus.exe3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\Doofus.exe3⤵
- Views/modifies file attributes
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Users\Admin\AppData\Local\Temp\SevenRecode.exe C:\Windows\System32\SevenRecode.exe2⤵PID:3776
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:944
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "SevenRecode" /tr "C:\Windows\System32\Doofus.exe" /sc minute /mo 1 /rl highest /f2⤵
- Creates scheduled task(s)
PID:4500
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2864
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5a76a84cb42da8c34121ce67690cf7ab7
SHA155fd18ec3bcb3cb7d88e6f30a6c9227d583cc238
SHA2561043d01d6b38dead9d9abbf311564f29e514603af384ddc57ca01a1c789caeb6
SHA51224d8e3cc87b84453cef44db2fe40e96287c9ddd195d0a5be01ff4cdc26ac90b3b9fa961dd377fd09f66a99c8f3e47cd680ba8c63120aff4214769c871eed980c