Analysis

  • max time kernel
    124s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 20:49

General

  • Target

    SevenRedCodeDotnet.exe

  • Size

    29KB

  • MD5

    6cb47e081f6ea443b85148da0ca08676

  • SHA1

    a228c0c7195711aaaacd67d6a1b5f0d496cc76e8

  • SHA256

    e4cc762160752939488ba02e74a9d06486e4f5b43454a24045d26996b63ed07a

  • SHA512

    a75ca6ba78f8fe2c4ad7b5e5743d119a7509b6ab4fb73b1cd49d457998b55d634b648966bbb2cb502859f09782a20ef441d690f2b015119ea380f2fde80ad237

  • SSDEEP

    768:OH7zz3LcywbQ/eUWcKh59SsXj5L7fxgRb3LjaNbOtXR:OH7zz3LcywbQ/eUWcKh59SEj5L7fxIb1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe
    "C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Windows\System32\Doofus.exe
      2⤵
        PID:4088
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRedCodeDotnet.exe C:\Users\Public\Documents\Doofus.exe
        2⤵
          PID:3200
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C attrib +h C:\Windows\System32\Doofus.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h C:\Windows\System32\Doofus.exe
            3⤵
            • Views/modifies file attributes
            PID:2172
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C attrib +h C:\Users\Public\Documents\Doofus.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3708
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h C:\Users\Public\Documents\Doofus.exe
            3⤵
            • Views/modifies file attributes
            PID:3052
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C copy C:\Windows\System32\C:\Users\Admin\AppData\Local\Temp\SevenRecode.exe C:\Windows\System32\SevenRecode.exe
          2⤵
            PID:4668
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C attrib +h C:\Windows\System32\SevenRecode.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5084
            • C:\Windows\SysWOW64\attrib.exe
              attrib +h C:\Windows\System32\SevenRecode.exe
              3⤵
              • Views/modifies file attributes
              PID:2744
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C attrib +h C:\Users\Public\Documents\SevenRecode.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4776
            • C:\Windows\SysWOW64\attrib.exe
              attrib +h C:\Users\Public\Documents\SevenRecode.exe
              3⤵
              • Views/modifies file attributes
              PID:4556
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /tn "SevenRecode" /tr "C:\Windows\System32\Doofus.exe" /sc minute /mo 1 /rl highest /f
            2⤵
            • Creates scheduled task(s)
            PID:2400
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          1⤵
            PID:3708
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
            1⤵
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1284

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3776-0-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

            Filesize

            4KB

          • memory/3776-1-0x0000000000A10000-0x0000000000A1E000-memory.dmp

            Filesize

            56KB