Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/07/2023, 08:58
Behavioral task
behavioral1
Sample
runs.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
runs.ps1
Resource
win10v2004-20230703-en
General
-
Target
runs.ps1
-
Size
3KB
-
MD5
b9eeef211ccc99e98293a4f7cf5c7084
-
SHA1
4e2521900e3c1aafaa097a126b43ca1e19b7e289
-
SHA256
c79e55e22a00297e4e33a80b56bc1122c5f316c4dcd854414a26318a6db8fde7
-
SHA512
02336caa57be954d08844d3fe2e5135543e45767d4042819892206cecd5db7a6e29fd6b1e0d2e26f385bfc4168c730d0ea2d4196923ed3d901d9aa7362e58211
Malware Config
Extracted
metasploit
windows/reverse_http
http://193.37.254.27:33038/kMxuxZbnZNEBpwCmYgPolwLaV2IfqcL_IKKE51
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1520 dw20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2844 1716 powershell.exe 3 PID 1716 wrote to memory of 2844 1716 powershell.exe 3 PID 1716 wrote to memory of 2844 1716 powershell.exe 3 PID 2844 wrote to memory of 2932 2844 csc.exe 2 PID 2844 wrote to memory of 2932 2844 csc.exe 2 PID 2844 wrote to memory of 2932 2844 csc.exe 2 PID 1716 wrote to memory of 1520 1716 powershell.exe 1 PID 1716 wrote to memory of 1520 1716 powershell.exe 1 PID 1716 wrote to memory of 1520 1716 powershell.exe 1
Processes
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11041⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1520
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9168.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9157.tmp"1⤵PID:2932
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vm7ikibv.cmdline"1⤵
- Suspicious use of WriteProcessMemory
PID:2844
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\runs.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD502f09b3e5a082d263fb69f093feb6021
SHA1fa0491e3b9cdb67418bfc93a49e0022c29eb8a31
SHA25655dec518d818f3db1ac08e8c46ec20a6db865634b1e1f0eaf7239bf25613bf41
SHA512620477a244747ad7386b232afe222669656b79667682f67c76a2559a2b39645f5ef83030ccc3357dc560dc1ede1a2e78c7d853857a7e2b37bc12bd7b915b6345
-
Filesize
3KB
MD5d11e3ad6c56433bab4c7754d44ae7ddc
SHA11ff73a4bdffa2044a9daca10ba742402f4280c48
SHA25679c69a1181dd6f3222aed757f0888818e018d02b8533508202b428fe036a08af
SHA5127d6730800c406afe3bf5557e5b88d5611569df85965cb20bf9201ba9bb334a3b7a2c6f0c14284620d158fe047ebfa71d86e9660d5be98114ad9d66ca2ef71837
-
Filesize
7KB
MD55af0a2578a6ebfbe50ebad8cfb1334b0
SHA1fb4fe7c5f2d6e2f611823526b0f5b77024722455
SHA256a68567d67e539db8ad63ff8046ee9849ed3e6d8f9f73328a1eceaab84c16e67f
SHA512c50d05aae980dfbfdc29f963292013120f36afaba3f5cf31d3fd2501207e5a9322444f15b749d7c4b58f31b840232d8d0be72f45c25b8b048a6fdee81c5da8b1
-
Filesize
652B
MD5db9bffa2aa20063b1f26cf14ee1f7728
SHA160fb0750a83984ff5b2d7540b20a5e7c4b736b28
SHA25632c8b0f722e1513f2894878e276bb98056b49fee6efbda4ae40a0a80ab5a21ba
SHA51221f2cc0661c0d59e9b62f55d35ea9519cd17fa5f4dc43ec54f027802add426ec242a9a8c3f5a241a277fa9bfaf8fc84b3fafa892bfd7b16813261e753ad8a139
-
Filesize
603B
MD5677addd4c1b98774f1b219d3aa1eabd2
SHA15f59a3f00bd84152093052f9c3829c83db8c4e00
SHA256a090b092a209f60d19a53617119da7c5bd0a0c75475b112cd8b39ae07b5d274c
SHA512872046c86618c3ece4443532a0269f24195153f71d1df162b043147d2427e31c1030fef89a24652171361f6acd2cabaddb90381f3d7a01ccf5d74b97b387b451
-
Filesize
309B
MD56227a44b5e4ae76301f11e3998d7e10a
SHA103132e6eb242e0b1eb95bad8a7f83d551dd5cded
SHA2565f1891bba51822dcef8b89157d08c150d17c935c484bf3db8eba3807f1c52054
SHA512d7a82abab51456bb9926674625a1cfdb09deea9b15f48f8b29f0e2a54a5877d9d9bd0f577633704c7b7877ab39a4a679371059bbee1724a504cd49730955aa42