Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    39s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 14:26

General

  • Target

    keys.ps1

  • Size

    2KB

  • MD5

    5e3b955bdf29db57b0e61637efb4870d

  • SHA1

    7c0af96506aec951fc5d8de8574286050b2abce4

  • SHA256

    8d728990d82730e687856f9d2cab5eb8a3c91945bb03d522ef34a697fe63a787

  • SHA512

    201a0ec3224e4a72491b397a57d44c8fbf3cbb20fd54c41ec0e5b0ee3d242c6c930df92342330e47a5b8403a1b3d18584b9e1d3511b8c7bbb2bb5de6e2268cb1

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\keys.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2ub7csvr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14CA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC14AA.tmp"
        3⤵
          PID:1168
      • C:\Windows\system32\notepad.exe
        "C:\Windows\system32\notepad.exe" C:\Users\Administrator\Documents\lootkeys.txt
        2⤵
        • Opens file in notepad (likely ransom note)
        PID:1628
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
        PID:952

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2ub7csvr.dll

        Filesize

        3KB

        MD5

        736c4125ee3fc781213954d2e1da2625

        SHA1

        0c3f662f69e7da6d8b5c2bbd45a18f7be68b570f

        SHA256

        04e265ba07850d036417399f03652b04e325b394bd22e86ebc07d7baa2545844

        SHA512

        48e62d9766a0f1ffa7907d0dc568af21f1ae18aac81455d2fb64b5ce8f52ecb93609122dfad65cfe819f9f60854005321b1161b966f5e47c9e132bcf555b7a6e

      • C:\Users\Admin\AppData\Local\Temp\2ub7csvr.pdb

        Filesize

        7KB

        MD5

        6edf0cd8b991523d1e6b0b3bc8f4f7c5

        SHA1

        24d1c576d79066820abde9aaeb8d4c6a82734cfe

        SHA256

        fa82c5a46a87622eb0dc94d9995e199079778044943948dd134962f3405df6e0

        SHA512

        fee535a2f7ddf36471216fd9522dee27bad1cb9211c8f55bb0461d2ec470848d217c95dc6dac2bfeffe8e474dce0dd6d4171f4b9fe85dc347d7f7603f09f9c30

      • C:\Users\Admin\AppData\Local\Temp\RES14CA.tmp

        Filesize

        1KB

        MD5

        5af4af6973c21d4418278aa94a82336e

        SHA1

        84fc8d562f8b1bf369520b8ef27df265b7d9e2f2

        SHA256

        3ee519ddda97c7b82351624c36816b10611c6e6ca26216cd800a7bbee4190001

        SHA512

        6945fc540e3270938daf5eadb0633a3a601c6535f6fa6bc5e8de902513b94c616e093fd4f05867baab3492b7402720d90a7e5e2589ab1fb95df0247b01589704

      • C:\Users\Administrator\Documents\lootkeys.txt

        Filesize

        10B

        MD5

        6ca9200473d651ebc9efff77206f2eec

        SHA1

        b2615e92d932e691b4ba17764a2745b0cb66f997

        SHA256

        ecaa902d96a85a6e5920d6545632fc076c57a97ac46ce871accb35030da6cf24

        SHA512

        357537770b9aa0c9a08ffb07c6365711e69bad7eda43382c5ea0e0b64944afd9d5ae21088402cb8fca81d990c413cf961eb8f9f2bd99757c322b8c2ff5379c13

      • \??\c:\Users\Admin\AppData\Local\Temp\2ub7csvr.0.cs

        Filesize

        675B

        MD5

        61a7afcfb915aa8b873e11a8494b0f2e

        SHA1

        893ce0a14d8cc37c7266425a5c05d358f0c2c7d3

        SHA256

        fdd65a6b830b7e3ab5d114f9f9aa5bdf4e47bbf0ed784389b6d6fd454c708470

        SHA512

        2c8d4dedc6ac8ce594ae06696fc1a23fb9ab4eee04168663ef24dc1092d29f3145c782e02e49f9e6562877ead1ec596873fb623679691b824a07db0c71e5c46d

      • \??\c:\Users\Admin\AppData\Local\Temp\2ub7csvr.cmdline

        Filesize

        309B

        MD5

        380fac08864a4461c9edb29726cc49a0

        SHA1

        79e7078ead48636dfad4d9d655d85ebf35dbc30a

        SHA256

        c832a712a145386ae428e8a9c0dd342a3b83c962bf17b821a9f989bfe4f8458b

        SHA512

        4cb469e3e98d7f2210c2df0882e68fd5253da839618670b54974969f46cd25a492a2c04724ff7a094399aed6078888c5a8367f90d14de1933e0771b7bec6181c

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC14AA.tmp

        Filesize

        652B

        MD5

        4b7046f42cb4f1ae8ad68b0b65ea501a

        SHA1

        47377aeb54eef45a0513b5ad444dcb8e2d95352e

        SHA256

        e08da950a3c55cb2006633abcd14fc8d6adb0f787c1c89b217071c2e57508bd4

        SHA512

        6f95de8e7ccf3e68a2e2866fb79ce8f33844456e5a48feee91fc75e4d68ba697d08d4203659147b2d3da97e2f15f43a845ccb752fea768aa59d633d7d0432911

      • memory/2040-62-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-58-0x000000001B300000-0x000000001B5E2000-memory.dmp

        Filesize

        2.9MB

      • memory/2040-61-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-76-0x00000000025F0000-0x00000000025F8000-memory.dmp

        Filesize

        32KB

      • memory/2040-60-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-80-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-82-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-81-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-83-0x0000000002250000-0x00000000022D0000-memory.dmp

        Filesize

        512KB

      • memory/2040-59-0x0000000002310000-0x0000000002318000-memory.dmp

        Filesize

        32KB