Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2023, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
comics.ps1
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
comics.ps1
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
titles.lnk
Resource
win7-20230220-en
General
-
Target
titles.lnk
-
Size
1KB
-
MD5
cd40170ef364117a2ee437c47ec6b564
-
SHA1
48346fe1585ead2a8ab4f5fdccd264c5f9cd502a
-
SHA256
24bb33a3a191cb0fba721820a31a8560abd7b3d0fafabe5f85a700e47772b571
-
SHA512
a901f85abbb2be9d8f2165de0aceb502c8c95797c987ad0fea4a9781eaf509d2e1e4ccd5b1c51eb4b16d86a78fcb25c52d20b91623c0511c89c4eb585f6b209f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1728 powershell.exe 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1728 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1728 2036 cmd.exe 28 PID 2036 wrote to memory of 1728 2036 cmd.exe 28 PID 2036 wrote to memory of 1728 2036 cmd.exe 28 PID 1728 wrote to memory of 1340 1728 powershell.exe 29 PID 1728 wrote to memory of 1340 1728 powershell.exe 29 PID 1728 wrote to memory of 1340 1728 powershell.exe 29 PID 1340 wrote to memory of 968 1340 csc.exe 30 PID 1340 wrote to memory of 968 1340 csc.exe 30 PID 1340 wrote to memory of 968 1340 csc.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\titles.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass -file comics.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qexahram.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B02.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1B01.tmp"4⤵PID:968
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d2ad9119c539f0be94761ce67d0c5585
SHA130a0547cf35c3904b7a82117e4595585918791c6
SHA2561140ea3fcf6e14827b3ddee34cf45ae82aa44aa1d8e5fca9e531e689304ca93c
SHA512e6e920f8a58132646c20d8ec226f6c77c672cc7b58481e5e3b0795d416cbadc244e8d7eaf433b60ae78794762bab94bc678273bece6150500e037fc71bb1f86d
-
Filesize
3KB
MD53f391270d1956b936c8e317798b7137a
SHA168dae32d1bd80249466ea16716519d8599df29e3
SHA256750e334ca369f979a2b24bc321c3a625ab753024dee479c0f9a83be14ba33608
SHA512fc05301751eecc0cc3a03f3d543de3b5dc0bf2d2a1f0d817d8340e75d76f1f54082f1202eed8a941dc538800aad4df5cc1782f071468ecd4ba83441fea4cb1ad
-
Filesize
7KB
MD5a21e3cf057cc5373f2ae89c0c3f42abd
SHA1c601c426f74b61039484bf57cfab8651ece35082
SHA25671d851cb073145a8c9c0e4d5a67a82e0f8484f4c4c4014f4eec50ea9bad9b6e8
SHA51237a5b9d8f8e811b9c7771935a58ed6855a8be54e8e8baede04a5633863a9cde809e2b5d6f64679c2129447b22011b3c825eb85fd3d8a7676e360acc0249fce1f
-
Filesize
652B
MD51cc2d48d5b7b06a86a56e07301ec914b
SHA18d7d54a04163bdeda281f4bceef6568b76df3001
SHA256f4795c1f965f5f545a1a5b6fe91e0a657478d8206d9ba2615b74371c65d17034
SHA5126dfef9888b44cf86896b3247b517793127bd70fa7b2d90ddbc3ac11760f3301024e81b88489317fd8a61ce4cef52dded0171c7e82275678ab9beebcd342f3c0d
-
Filesize
203B
MD5b611be9282deb44eed731f72bcbb2b82
SHA1cc1d606d853bbabd5fef87255356a0d54381c289
SHA256ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6
SHA51263b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4
-
Filesize
309B
MD5015eb74e813257d802bed387abf7561c
SHA10ffa671e6d35129e182a9af574145881877faa62
SHA256816cbadf7b40f52b3386e91c2ae589e88702b5bb4915ce9c34877153f12da2c9
SHA512ac1964359e499584bfb9580bf58597219b4d9173d86f0805f260781d914c6439c46fcba87a55e882a22a42fd49b9e90d1737a1aa5ad14ecf02e97ed57852e101