Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
code.ps1
Resource
win10v2004-20230703-en
3 signatures
150 seconds
General
-
Target
code.ps1
-
Size
14B
-
MD5
28f35476af08ba7d170529ec46484b98
-
SHA1
f02f4e3d6fb882823b798a3bb1e4336af20d9562
-
SHA256
093656492e3a7ab60f75f0575a89b9d9c8e7ff1d03b5419927792394407b7a7c
-
SHA512
5a6f49d47c8560c1a0a5a53a86a55ec6d108990aa3062931c774bc0c28f7c7e1e8b418b3fc1cfbf0e4798874dc38014dfd81493294c4b800fcdb6464498854d2
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1356 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1356 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2560 1356 powershell.exe 29 PID 1356 wrote to memory of 2560 1356 powershell.exe 29 PID 1356 wrote to memory of 2560 1356 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\code.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\print.exe"C:\Windows\system32\print.exe" Hello2⤵PID:2560
-