Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/10/2023, 07:45
231022-jlnrgsec5z 122/10/2023, 07:45
231022-jlfqwaec5x 122/10/2023, 07:16
231022-h396dafg39 122/10/2023, 07:16
231022-h35kwsdh91 122/10/2023, 02:52
231022-dc448aeh48 122/10/2023, 00:56
231022-bafyhacg5v 121/10/2023, 23:14
231021-28f92ace5w 121/10/2023, 23:13
231021-27wnbsed44 121/10/2023, 22:55
231021-2v3wwaed24 121/10/2023, 22:52
231021-2tp9dsec99 1Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
android-x86-arm-20231020-en
Behavioral task
behavioral3
Sample
script.ps1
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
script.ps1
Resource
android-x64-arm64-20231020-en
Behavioral task
behavioral5
Sample
script.ps1
Resource
macos-20220504-en
General
-
Target
script.ps1
-
Size
7B
-
MD5
b53e9d6ee571941799a04433ef54b973
-
SHA1
525df30db44c421d4c9d9f4a0aa55f0b3da13405
-
SHA256
bb2577fdef6d5d1596b10a9b1300dfb84243a8088dda01006dd4357f89f9cc8c
-
SHA512
b855aa9789acf4a3927421690d3f8fda22c2b93ec61ed215e792f8eadee0d8aa053b7f09b05e1b5037cb7286fb5d5b32c9bc21312ca788fa52375089a45cfa10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2768 3000 powershell.exe 29 PID 3000 wrote to memory of 2768 3000 powershell.exe 29 PID 3000 wrote to memory of 2768 3000 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\Wbem\WinMgmt.exe"C:\Windows\System32\Wbem\WinMgmt.exe"2⤵PID:2768
-