Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
61c35886ce173b8aee9c3b6c661135c0348914794b4281c92cc2729897112bd8.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61c35886ce173b8aee9c3b6c661135c0348914794b4281c92cc2729897112bd8.ps1
Resource
win10v2004-20231215-en
General
-
Target
61c35886ce173b8aee9c3b6c661135c0348914794b4281c92cc2729897112bd8.ps1
-
Size
666KB
-
MD5
9788594e984bdcbdad035ad54bce917b
-
SHA1
cc9b372acfb90f1018706130b7cda3130aa5cb94
-
SHA256
61c35886ce173b8aee9c3b6c661135c0348914794b4281c92cc2729897112bd8
-
SHA512
fab8d852ffe9a6aea5a3d131f7207453b751a4dd449675da9269e71c8141159ecdffb8ab9cd9db65ea1929ed5013bf7964a3803898e9b94d469000ed18ba0f46
-
SSDEEP
6144:TCxCRcRCTYRaBdhyG+7SSe8ob0ZAHZJulnIfg1s9ze3gx3kJdUWhB05lhdSEVWqk:TxzFTb5AvcCEUv
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1516 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\61c35886ce173b8aee9c3b6c661135c0348914794b4281c92cc2729897112bd8.ps11⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516