Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 14:30
Behavioral task
behavioral1
Sample
aasd.ps1
Resource
win7-20220901-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
aasd.ps1
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
aasd.ps1
-
Size
194KB
-
MD5
d5bda808df861bbda7835e9cc88bf8f8
-
SHA1
d8044382a5f1e3f855d1882e7d6447fc1111947e
-
SHA256
702722319c2f771675257417051213d26a9709ef6dd1c867e093e6f407fcdfae
-
SHA512
9a758e4bc523529f8264622d047a5ea6c2a69d01887db22c919f681e4c2a69b15e6f540076f1c99e386ef4985ac5047d284abb40c8a8a0b8c4b29d0ea0ca98d0
-
SSDEEP
3072:BN3qRnrPNhO0Vm9AdbTPJls5JeuGsP32mF4WQx8x8AYjmY8yoZNBd0Y2Du5/ASQt:6RjtVuwT/s5J7zGdZC28yYH0KB7+
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 50 IoCs
flow pid Process 3 1660 powershell.exe 5 1660 powershell.exe 7 1660 powershell.exe 8 1660 powershell.exe 9 1660 powershell.exe 10 1660 powershell.exe 11 1660 powershell.exe 12 1660 powershell.exe 13 1660 powershell.exe 14 1660 powershell.exe 15 1660 powershell.exe 16 1660 powershell.exe 17 1660 powershell.exe 18 1660 powershell.exe 19 1660 powershell.exe 20 1660 powershell.exe 21 1660 powershell.exe 22 1660 powershell.exe 23 1660 powershell.exe 24 1660 powershell.exe 26 1660 powershell.exe 27 1660 powershell.exe 28 1660 powershell.exe 29 1660 powershell.exe 30 1660 powershell.exe 31 1660 powershell.exe 32 1660 powershell.exe 33 1660 powershell.exe 34 1660 powershell.exe 35 1660 powershell.exe 36 1660 powershell.exe 37 1660 powershell.exe 38 1660 powershell.exe 39 1660 powershell.exe 40 1660 powershell.exe 41 1660 powershell.exe 42 1660 powershell.exe 43 1660 powershell.exe 44 1660 powershell.exe 45 1660 powershell.exe 46 1660 powershell.exe 47 1660 powershell.exe 48 1660 powershell.exe 49 1660 powershell.exe 50 1660 powershell.exe 51 1660 powershell.exe 52 1660 powershell.exe 53 1660 powershell.exe 54 1660 powershell.exe 55 1660 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1348 powershell.exe 1660 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1660 1348 powershell.exe 28 PID 1348 wrote to memory of 1660 1348 powershell.exe 28 PID 1348 wrote to memory of 1660 1348 powershell.exe 28 PID 1348 wrote to memory of 1660 1348 powershell.exe 28
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\aasd.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe"c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-