Analysis
-
max time kernel
41s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
7z2401-x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7z2401-x64.exe
Resource
win10v2004-20241007-en
General
-
Target
7z2401-x64.exe
-
Size
1.5MB
-
MD5
de644b4e1086f1315c422f359133543b
-
SHA1
54be86d121879b0e5d86604297c57a926d665fa8
-
SHA256
17a507cce4066c4be7db53d64d9a9e11dfecfd4f2411393690506e591b5895cd
-
SHA512
714d41254352d91834a4b648d613e9b4452b93b097b5781ec5bf3ec7c310a489d3a1c409b2f0a6946822b96f6943b579910d26a5f4324b320d485e856dbdcb1a
-
SSDEEP
49152:8yEuRNRgYQYk6tC0tkaNuiXatTQY7quUncuTVyvn65:8yEoL7tCzlqLcuBz5
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 6 IoCs
pid Process 1840 7zFM.exe 2340 7zG.exe 396 7zFM.exe 2380 7z.exe 1788 7z.exe 3148 7zG.exe -
Loads dropped DLL 1 IoCs
pid Process 3544 Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\descript.ion 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2401-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2401-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2401-x64.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2401-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2401-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2401-x64.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1840 7zFM.exe 396 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1840 7zFM.exe Token: 35 1840 7zFM.exe Token: SeRestorePrivilege 396 7zFM.exe Token: 35 396 7zFM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7z2401-x64.exe"C:\Users\Admin\AppData\Local\Temp\7z2401-x64.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4392
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4720
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe"1⤵
- Executes dropped EXE
PID:2340
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:396
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe"1⤵
- Executes dropped EXE
PID:2380
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe"1⤵
- Executes dropped EXE
PID:1788
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe"1⤵
- Executes dropped EXE
PID:3148
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\7-Zip\readme.txt1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50bb139023eb3e17dedf9780a66e99a1a
SHA1da841883ee156ffb2c1718e6aa20d30d4d578691
SHA2560cdacb5eb70ca2b16ab333ee870983750103865fedb167c9d6068019b8197a4f
SHA512ff9c15ac88bb233d9dd1dfb66a0dd9df5d87e7ae0ca282a6223fcd2ee69896056f330d9af6a4a7f913f9ed97b5bf77e8adfaa43270a7e39eaa91d039cb8f445d
-
Filesize
543KB
MD52f58d2175bd282f29cb215275a18100f
SHA1f7daad8646e9b633b9e57df43ec819d6e72c907c
SHA256cf20cf85335562d6d62ba191614393f8da80664d3d6126c9fbaec9c7caadaaa2
SHA51244ae15cada6b0823e0717a27dcfe2e4bd245184c0dd96961de7ff2eaabc3947fffb6fe86c9fb0f77e39fb81f0bf2a54f86206d9f7a267a05cee38525c65d54e4
-
Filesize
929KB
MD56156ebaea891ddbfcb1187f628ec7577
SHA1778fd5d5dec21f95c5aa554567e06da8295b9a47
SHA2564853947e14bf30ab40702c34f80fb113c45619a73f89a938f2284c786e35c9fe
SHA512ed166095ceb46ff77e1081263aea03cb97b5d244a7e4060b6b37c847fd496a7e577f297846414ff130e01484f44f9da2566e2572c6cd69e9b419c311799a511a
-
Filesize
682KB
MD5780f46e18996e23a6bdc80b21618938d
SHA12278065b8324efa4a8d92f6b015bc58d5319f26c
SHA256b126a83eeab06947c6babf0be8e469274585218ffc2dab5a6d650e5dbc4e58be
SHA512a6c6ba2ccfc9dc6d813423ad04945fe664140d8c28906e1f4f59f8b300ff553a0747e0d7ab22ef4bb727b038f8282fe013a494fb9799f7a2c59445fd19124d4b