Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/10/2023, 07:45
231022-jlnrgsec5z 122/10/2023, 07:45
231022-jlfqwaec5x 122/10/2023, 07:16
231022-h396dafg39 122/10/2023, 07:16
231022-h35kwsdh91 122/10/2023, 02:52
231022-dc448aeh48 122/10/2023, 00:56
231022-bafyhacg5v 121/10/2023, 23:14
231021-28f92ace5w 121/10/2023, 23:13
231021-27wnbsed44 121/10/2023, 22:55
231021-2v3wwaed24 121/10/2023, 22:52
231021-2tp9dsec99 1Analysis
-
max time kernel
127s -
max time network
160s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
22/10/2023, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
android-x86-arm-20231020-en
Behavioral task
behavioral3
Sample
script.ps1
Resource
android-x64-20230831-en
Behavioral task
behavioral4
Sample
script.ps1
Resource
android-x64-arm64-20231020-en
General
-
Target
script.ps1
-
Size
7B
-
MD5
b53e9d6ee571941799a04433ef54b973
-
SHA1
525df30db44c421d4c9d9f4a0aa55f0b3da13405
-
SHA256
bb2577fdef6d5d1596b10a9b1300dfb84243a8088dda01006dd4357f89f9cc8c
-
SHA512
b855aa9789acf4a3927421690d3f8fda22c2b93ec61ed215e792f8eadee0d8aa053b7f09b05e1b5037cb7286fb5d5b32c9bc21312ca788fa52375089a45cfa10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3372 1760 powershell.exe 72 PID 1760 wrote to memory of 3372 1760 powershell.exe 72
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\System32\Wbem\WinMgmt.exe"C:\Windows\System32\Wbem\WinMgmt.exe"2⤵PID:3372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a