Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
522s -
max time network
524s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win10v2004-20220812-en
4 signatures
1800 seconds
General
-
Target
code.ps1
-
Size
14KB
-
MD5
7a26dbf6adddc8afb923321bd84a569d
-
SHA1
87f5469280b5bba689856e52a6fdae0be2aec941
-
SHA256
6109ffa74f726ff62658d7ecdbc91f2bde70b0436419fda6c7f1f301a101b09a
-
SHA512
242cd5d4627bbbd5a7dc26c09d44326aebcc5e38db3adb5c824fdb498a4881f81bd6fc3ce40cf5abf6c2517766ba7aee44c6cb4b69b21d8baabe24dfa4825dc8
-
SSDEEP
384:dwuRGuHnyVzVT+qNNqNRea0slBoCLQIR69Y:dwuVqNNqNwa3BZXR9
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 8 4984 powershell.exe 20 4688 powershell.exe 21 4448 powershell.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4984 powershell.exe 4984 powershell.exe 4688 powershell.exe 4688 powershell.exe 4448 powershell.exe 4448 powershell.exe 436 powershell.exe 436 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 436 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4688 4984 powershell.exe 83 PID 4984 wrote to memory of 4688 4984 powershell.exe 83 PID 4984 wrote to memory of 4448 4984 powershell.exe 85 PID 4984 wrote to memory of 4448 4984 powershell.exe 85 PID 4984 wrote to memory of 436 4984 powershell.exe 87 PID 4984 wrote to memory of 436 4984 powershell.exe 87
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\code.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-