Analysis
-
max time kernel
124s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
SevenRedCodeDotnet.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
SevenRedCodeDotnet.exe
Resource
win11-20240426-en
General
-
Target
SevenRedCodeDotnet.exe
-
Size
29KB
-
MD5
6cb47e081f6ea443b85148da0ca08676
-
SHA1
a228c0c7195711aaaacd67d6a1b5f0d496cc76e8
-
SHA256
e4cc762160752939488ba02e74a9d06486e4f5b43454a24045d26996b63ed07a
-
SHA512
a75ca6ba78f8fe2c4ad7b5e5743d119a7509b6ab4fb73b1cd49d457998b55d634b648966bbb2cb502859f09782a20ef441d690f2b015119ea380f2fde80ad237
-
SSDEEP
768:OH7zz3LcywbQ/eUWcKh59SsXj5L7fxgRb3LjaNbOtXR:OH7zz3LcywbQ/eUWcKh59SEj5L7fxIb1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation SevenRedCodeDotnet.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2400 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3776 SevenRedCodeDotnet.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe Token: SeIncBasePriorityPrivilege 1284 mmc.exe Token: 33 1284 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1284 mmc.exe 1284 mmc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4088 3776 SevenRedCodeDotnet.exe 83 PID 3776 wrote to memory of 4088 3776 SevenRedCodeDotnet.exe 83 PID 3776 wrote to memory of 4088 3776 SevenRedCodeDotnet.exe 83 PID 3776 wrote to memory of 3200 3776 SevenRedCodeDotnet.exe 85 PID 3776 wrote to memory of 3200 3776 SevenRedCodeDotnet.exe 85 PID 3776 wrote to memory of 3200 3776 SevenRedCodeDotnet.exe 85 PID 3776 wrote to memory of 4904 3776 SevenRedCodeDotnet.exe 86 PID 3776 wrote to memory of 4904 3776 SevenRedCodeDotnet.exe 86 PID 3776 wrote to memory of 4904 3776 SevenRedCodeDotnet.exe 86 PID 3776 wrote to memory of 3708 3776 SevenRedCodeDotnet.exe 87 PID 3776 wrote to memory of 3708 3776 SevenRedCodeDotnet.exe 87 PID 3776 wrote to memory of 3708 3776 SevenRedCodeDotnet.exe 87 PID 3776 wrote to memory of 4668 3776 SevenRedCodeDotnet.exe 88 PID 3776 wrote to memory of 4668 3776 SevenRedCodeDotnet.exe 88 PID 3776 wrote to memory of 4668 3776 SevenRedCodeDotnet.exe 88 PID 3776 wrote to memory of 5084 3776 SevenRedCodeDotnet.exe 89 PID 3776 wrote to memory of 5084 3776 SevenRedCodeDotnet.exe 89 PID 3776 wrote to memory of 5084 3776 SevenRedCodeDotnet.exe 89 PID 3776 wrote to memory of 4776 3776 SevenRedCodeDotnet.exe 90 PID 3776 wrote to memory of 4776 3776 SevenRedCodeDotnet.exe 90 PID 3776 wrote to memory of 4776 3776 SevenRedCodeDotnet.exe 90 PID 5084 wrote to memory of 2744 5084 cmd.exe 97 PID 5084 wrote to memory of 2744 5084 cmd.exe 97 PID 5084 wrote to memory of 2744 5084 cmd.exe 97 PID 4904 wrote to memory of 2172 4904 cmd.exe 98 PID 4904 wrote to memory of 2172 4904 cmd.exe 98 PID 4904 wrote to memory of 2172 4904 cmd.exe 98 PID 3708 wrote to memory of 3052 3708 cmd.exe 99 PID 3708 wrote to memory of 3052 3708 cmd.exe 99 PID 3708 wrote to memory of 3052 3708 cmd.exe 99 PID 3776 wrote to memory of 2400 3776 SevenRedCodeDotnet.exe 100 PID 3776 wrote to memory of 2400 3776 SevenRedCodeDotnet.exe 100 PID 3776 wrote to memory of 2400 3776 SevenRedCodeDotnet.exe 100 PID 4776 wrote to memory of 4556 4776 cmd.exe 101 PID 4776 wrote to memory of 4556 4776 cmd.exe 101 PID 4776 wrote to memory of 4556 4776 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 2744 attrib.exe 2172 attrib.exe 3052 attrib.exe 4556 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Windows\System32\Doofus.exe2⤵PID:4088
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Users\Public\Documents\Doofus.exe2⤵PID:3200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\Doofus.exe3⤵
- Views/modifies file attributes
PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\Doofus.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\Doofus.exe3⤵
- Views/modifies file attributes
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRecode.exe C:\Windows\System32\SevenRecode.exe2⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Windows\System32\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Windows\System32\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C attrib +h C:\Users\Public\Documents\SevenRecode.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Public\Documents\SevenRecode.exe3⤵
- Views/modifies file attributes
PID:4556
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "SevenRecode" /tr "C:\Windows\System32\Doofus.exe" /sc minute /mo 1 /rl highest /f2⤵
- Creates scheduled task(s)
PID:2400
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:3708
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1284