Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/10/2023, 07:45

231022-jlnrgsec5z 1

22/10/2023, 07:45

231022-jlfqwaec5x 1

22/10/2023, 07:16

231022-h396dafg39 1

22/10/2023, 07:16

231022-h35kwsdh91 1

22/10/2023, 02:52

231022-dc448aeh48 1

22/10/2023, 00:56

231022-bafyhacg5v 1

21/10/2023, 23:14

231021-28f92ace5w 1

21/10/2023, 23:13

231021-27wnbsed44 1

21/10/2023, 22:55

231021-2v3wwaed24 1

21/10/2023, 22:52

231021-2tp9dsec99 1

Analysis

  • max time kernel
    127s
  • max time network
    160s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/10/2023, 02:52

General

  • Target

    script.ps1

  • Size

    7B

  • MD5

    b53e9d6ee571941799a04433ef54b973

  • SHA1

    525df30db44c421d4c9d9f4a0aa55f0b3da13405

  • SHA256

    bb2577fdef6d5d1596b10a9b1300dfb84243a8088dda01006dd4357f89f9cc8c

  • SHA512

    b855aa9789acf4a3927421690d3f8fda22c2b93ec61ed215e792f8eadee0d8aa053b7f09b05e1b5037cb7286fb5d5b32c9bc21312ca788fa52375089a45cfa10

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\System32\Wbem\WinMgmt.exe
      "C:\Windows\System32\Wbem\WinMgmt.exe"
      2⤵
        PID:3372

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m2devdvm.ktp.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • memory/1760-4-0x000002C7D1420000-0x000002C7D1442000-memory.dmp

      Filesize

      136KB

    • memory/1760-5-0x00007FF847A50000-0x00007FF84843C000-memory.dmp

      Filesize

      9.9MB

    • memory/1760-6-0x000002C7D1310000-0x000002C7D1320000-memory.dmp

      Filesize

      64KB

    • memory/1760-7-0x000002C7D1310000-0x000002C7D1320000-memory.dmp

      Filesize

      64KB

    • memory/1760-10-0x000002C7D15D0000-0x000002C7D1646000-memory.dmp

      Filesize

      472KB

    • memory/1760-23-0x000002C7D1310000-0x000002C7D1320000-memory.dmp

      Filesize

      64KB

    • memory/1760-25-0x00007FF847A50000-0x00007FF84843C000-memory.dmp

      Filesize

      9.9MB