Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2023, 08:49

General

  • Target

    takepic.ps1

  • Size

    7KB

  • MD5

    66f361d6a15ec91f56907fec1a7cdd8b

  • SHA1

    f186c6eee98eb4baee0883c669427e69f6e22044

  • SHA256

    c08449403abf298731d9b2c0212be126fb3811640cbea98011c1dd3d79bef126

  • SHA512

    4471b41bd57cf24eaca9a01d7d21e92da3cdd399e0ebe0c6fd7f2edb41c32825086f65b51389f3217c7e65ab55d1d0dc19859c559bd3989fca747d0c8846e783

  • SSDEEP

    96:0lpBw/zUzq/F5LFA9uq97jAqquKlPuGWRVxReI9ZQD3L5RJLLK:6GCq/FJ3q97jAxH2zLWLFLK

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\takepic.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k-i4rcry.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2CA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD2C9.tmp"
        3⤵
          PID:2604

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESD2CA.tmp

      Filesize

      1KB

      MD5

      c86633e3878b2a4de6942dbc928ae578

      SHA1

      92a5c6b1fd335a0241c253466840cbbff2a9704d

      SHA256

      480d55ddd27ba95375f78f30c5165021e4ffc723a3ef84e747f7a0d2a4ba3fa7

      SHA512

      c0f5dd7141b286535e714d308592b51b2f8017630ca0f953a217edb8ad2f1d321b8994cfa628b7db2809a7163e5d8840d234c74fd285cde9b8e6e1556021a89c

    • C:\Users\Admin\AppData\Local\Temp\k-i4rcry.dll

      Filesize

      5KB

      MD5

      0758b3e0ca898c2625a213d80c77c204

      SHA1

      10f97b3968f4383e87d8fb675c3ce3ed78791549

      SHA256

      0626adb66da2eaa169d17123ccfe681e871f9212a4b91c20ba5bf763ed366ce4

      SHA512

      9aeb6bde773f49321909d17fd771f0f954b891479075a7fb4bce332edd1b1fe44eb0fe2786f65ca63a3298d6ddb4e780b87e5fb9d38de35cde14b9c22abe0ff3

    • C:\Users\Admin\AppData\Local\Temp\k-i4rcry.pdb

      Filesize

      11KB

      MD5

      3927863952b4f90200e9dd22e96d2586

      SHA1

      288bf37065e6a4ea30dbf3578fc674e515b8b314

      SHA256

      322609028cecd573cab1db83a28ed114130beb17437dccd1585cd7278e6ed425

      SHA512

      00bfd6f034e6618aef2ba7e1c8fc70c1ea8b1476ee5fbc92e1b7f5861a18da78b64cb71ea00fdc6b94e29f7a991b610c48010ab27b447ffcbd2519dc09c89b4e

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCD2C9.tmp

      Filesize

      652B

      MD5

      4af8e0f079d0ad494f4f8f9f6b35449e

      SHA1

      6b72ca1b51be88ff78569a3a0efbdd5f77379e78

      SHA256

      a71afc7ee41f66403b457f68176de79940bb7ba42ec4bde9f5789229ef965e4b

      SHA512

      217e60c3fcc6df34f96ef270991c2f38daec22b3d2a7e886a9e03cbc0b84623e22d6ff0c4c16f7eab5dfe017cc6b27f17aacda0b405e962716a9a75c45fd54a2

    • \??\c:\Users\Admin\AppData\Local\Temp\k-i4rcry.0.cs

      Filesize

      4KB

      MD5

      dec068b01faab0ddff3aedde79923a04

      SHA1

      1fd3e4290b2a0b8f966a053b4ac92781661bd684

      SHA256

      a724aa6fdfd62c795655d4a67ad6a527bf0b1197cbab79b0c6a50d651ec6ea04

      SHA512

      50bc7c44dc81a9d3168d02daf86ed015cc8547d5a0cf7eb088356c81ff9d90d3370fe58826047e906df8b0fab41b76e4cbb73c6a3c498dfbb3d214193c69ab8c

    • \??\c:\Users\Admin\AppData\Local\Temp\k-i4rcry.cmdline

      Filesize

      509B

      MD5

      f0ed8d5158dde4fd887c63a69cfe8993

      SHA1

      b516b2d750c0e6b3e4799d0fc42478dfb5375b04

      SHA256

      8537bc81163dea2c87b362f9cb034a79e2942c941bebf875bb78583c53bcbdaa

      SHA512

      5a00c53691f28c44550a0cf378e246dc2711ccd036da4dd10da4c0d96a67620ceedeb54c1f1824d1d84b530c987e5c33d2a46556b89ab5089e17cc636e5f7e65

    • memory/1964-63-0x0000000002A70000-0x0000000002AF0000-memory.dmp

      Filesize

      512KB

    • memory/1964-62-0x0000000002A70000-0x0000000002AF0000-memory.dmp

      Filesize

      512KB

    • memory/1964-64-0x0000000002A70000-0x0000000002AF0000-memory.dmp

      Filesize

      512KB

    • memory/1964-65-0x0000000002A70000-0x0000000002AF0000-memory.dmp

      Filesize

      512KB

    • memory/1964-58-0x000000001B3C0000-0x000000001B6A2000-memory.dmp

      Filesize

      2.9MB

    • memory/1964-61-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

      Filesize

      9.6MB

    • memory/1964-79-0x0000000002780000-0x0000000002788000-memory.dmp

      Filesize

      32KB

    • memory/1964-60-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

      Filesize

      9.6MB

    • memory/1964-59-0x0000000002490000-0x0000000002498000-memory.dmp

      Filesize

      32KB

    • memory/1964-83-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

      Filesize

      9.6MB