Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/07/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
takepic.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
takepic.ps1
Resource
win10v2004-20230703-en
General
-
Target
takepic.ps1
-
Size
7KB
-
MD5
66f361d6a15ec91f56907fec1a7cdd8b
-
SHA1
f186c6eee98eb4baee0883c669427e69f6e22044
-
SHA256
c08449403abf298731d9b2c0212be126fb3811640cbea98011c1dd3d79bef126
-
SHA512
4471b41bd57cf24eaca9a01d7d21e92da3cdd399e0ebe0c6fd7f2edb41c32825086f65b51389f3217c7e65ab55d1d0dc19859c559bd3989fca747d0c8846e783
-
SSDEEP
96:0lpBw/zUzq/F5LFA9uq97jAqquKlPuGWRVxReI9ZQD3L5RJLLK:6GCq/FJ3q97jAxH2zLWLFLK
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2808 1964 powershell.exe 29 PID 1964 wrote to memory of 2808 1964 powershell.exe 29 PID 1964 wrote to memory of 2808 1964 powershell.exe 29 PID 2808 wrote to memory of 2604 2808 csc.exe 30 PID 2808 wrote to memory of 2604 2808 csc.exe 30 PID 2808 wrote to memory of 2604 2808 csc.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\takepic.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k-i4rcry.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2CA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD2C9.tmp"3⤵PID:2604
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c86633e3878b2a4de6942dbc928ae578
SHA192a5c6b1fd335a0241c253466840cbbff2a9704d
SHA256480d55ddd27ba95375f78f30c5165021e4ffc723a3ef84e747f7a0d2a4ba3fa7
SHA512c0f5dd7141b286535e714d308592b51b2f8017630ca0f953a217edb8ad2f1d321b8994cfa628b7db2809a7163e5d8840d234c74fd285cde9b8e6e1556021a89c
-
Filesize
5KB
MD50758b3e0ca898c2625a213d80c77c204
SHA110f97b3968f4383e87d8fb675c3ce3ed78791549
SHA2560626adb66da2eaa169d17123ccfe681e871f9212a4b91c20ba5bf763ed366ce4
SHA5129aeb6bde773f49321909d17fd771f0f954b891479075a7fb4bce332edd1b1fe44eb0fe2786f65ca63a3298d6ddb4e780b87e5fb9d38de35cde14b9c22abe0ff3
-
Filesize
11KB
MD53927863952b4f90200e9dd22e96d2586
SHA1288bf37065e6a4ea30dbf3578fc674e515b8b314
SHA256322609028cecd573cab1db83a28ed114130beb17437dccd1585cd7278e6ed425
SHA51200bfd6f034e6618aef2ba7e1c8fc70c1ea8b1476ee5fbc92e1b7f5861a18da78b64cb71ea00fdc6b94e29f7a991b610c48010ab27b447ffcbd2519dc09c89b4e
-
Filesize
652B
MD54af8e0f079d0ad494f4f8f9f6b35449e
SHA16b72ca1b51be88ff78569a3a0efbdd5f77379e78
SHA256a71afc7ee41f66403b457f68176de79940bb7ba42ec4bde9f5789229ef965e4b
SHA512217e60c3fcc6df34f96ef270991c2f38daec22b3d2a7e886a9e03cbc0b84623e22d6ff0c4c16f7eab5dfe017cc6b27f17aacda0b405e962716a9a75c45fd54a2
-
Filesize
4KB
MD5dec068b01faab0ddff3aedde79923a04
SHA11fd3e4290b2a0b8f966a053b4ac92781661bd684
SHA256a724aa6fdfd62c795655d4a67ad6a527bf0b1197cbab79b0c6a50d651ec6ea04
SHA51250bc7c44dc81a9d3168d02daf86ed015cc8547d5a0cf7eb088356c81ff9d90d3370fe58826047e906df8b0fab41b76e4cbb73c6a3c498dfbb3d214193c69ab8c
-
Filesize
509B
MD5f0ed8d5158dde4fd887c63a69cfe8993
SHA1b516b2d750c0e6b3e4799d0fc42478dfb5375b04
SHA2568537bc81163dea2c87b362f9cb034a79e2942c941bebf875bb78583c53bcbdaa
SHA5125a00c53691f28c44550a0cf378e246dc2711ccd036da4dd10da4c0d96a67620ceedeb54c1f1824d1d84b530c987e5c33d2a46556b89ab5089e17cc636e5f7e65