Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 02:18

General

  • Target

    DevManager/DevManager.exe

  • Size

    494KB

  • MD5

    0109a891c39acb8c0c5285d8e67ccd7e

  • SHA1

    cb06b1a79aa67752e0c288f04a239bee1811725a

  • SHA256

    4c263a080f0b64531ce51df30afe78dac4127195d02fe94ebb768c026eb42d91

  • SHA512

    c9fb5db57225c49e4cd639c8b5f56f809675ac57bc1f58b65a79e00af5ca4c2c644b5d3ae0810fdc4da619cb39f4792856ed43c55bf22805bcbfb505c53df18c

  • SSDEEP

    12288:LjkArEN249AyE/rbaMct4bO2/xTMp6Ijswghf+gbwlaY0Wgr:AFE//Tct4bOsB06IjsdhfHslB0Wgr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DevManager\DevManager.exe
    "C:\Users\Admin\AppData\Local\Temp\DevManager\DevManager.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c call C:\Windows\temp\Device.bat
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\devcon.exe
        devcon status pci\cc_0300
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1868
      • C:\Windows\SysWOW64\devcon.exe
        devcon status pci\ven_10ec
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\1.txt

    Filesize

    156B

    MD5

    eea1c1e707ccd7525693d338717b6fb3

    SHA1

    0a849a8771cd6dd22637e189773bc4127a762aa5

    SHA256

    7bd3a14976fc93fa62172eed61159cc44d2793dd52b30ec33139297f2c987082

    SHA512

    9f611eed5fdedbbf9c36d3ff47be543f4ee15a0041abfbb77715a2515a38635287c002577893cea4141147efbac6ecf754bc8a17b432a8e818a32f29b85062ad

  • C:\Windows\Temp\Device.esp

    Filesize

    47B

    MD5

    26b5a466dfd69346509ccdb0229eb155

    SHA1

    ea2c8e4e386e9ae4c994cc231136a1ba36d57b1b

    SHA256

    3cdb9785c797707a894da7dbd20ede505a2a6ab6c745be8d714b96038b4fe9ae

    SHA512

    5af205dc7d8389a791185ee968678882c0350179d01773fcd14be1a32717ad8db6de876b6e3361b0c908e5ecea84cd7b861a4d32b60082397eb75819b091a46a

  • C:\Windows\temp\Device.bat

    Filesize

    82B

    MD5

    6614d4491dfe01eb293094050c635600

    SHA1

    e0221c442b18673ccacf9558a751905b6b17d845

    SHA256

    dd7a7cbd4f6d26a7782919500923424e062e2aa468d1ea8480981ce8b58dc49c

    SHA512

    ef917299b14647942536b1f27ad27c567a9e8ed7fc136955d07112e5bbb8fdf40491d845c395db3baf730a7ba87da208b665c9c0d47d95ffff56ccf178f56d7a

  • \Windows\SysWOW64\devcon.exe

    Filesize

    145KB

    MD5

    60347ff68ccc6e18f49a7179b0f0eb3e

    SHA1

    7e0d09107661d3498c2a553c7a92c57aa28129f6

    SHA256

    e21eecee093b890c82a343931dc40436d5eabc7b2c8e26ebd3295b90fd6a514a

    SHA512

    5a970199330a7d0b43f304f587d18c4f73a5679851275a3ed86f09ebb3b4a8eaea7603d0ccf378ae8792cb08e5b795f89ce4942fe3155c794bb2ad22bd40d63a

  • memory/2476-31-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-30-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-0-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-32-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-35-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-36-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-39-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-42-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-43-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2476-44-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB