Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/03/2024, 21:13

240318-z2v4haab76 7

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 21:13

General

  • Target

    test.ps1

  • Size

    44KB

  • MD5

    2c98495d5a3b04388c1e097c7ad24977

  • SHA1

    bd43b8fc5b6ce1120ae2612b84972062c2fa9eed

  • SHA256

    56823bbff95ac5ee68856b88c69d80f1688a907106c76cd84b5408936ecd5889

  • SHA512

    e6a0f83d407483388bff0d9cbaf9f2f08186d9f95508774886a3bf150dfacf6fec65d8bbc8537e7b13fb62a24062eed5e658fe95b6a005afd2347dcf7f1e7a50

  • SSDEEP

    768:n9JWliVXu/qRX3d9u55HXfXuoPZ0QjtC4jiV17021tF/XkQFATe5WMzJDlhLx3i9:n9JWQVX+qRXN9ubXWg04u1X1XdOeRDle

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\test.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-4-0x000000001B430000-0x000000001B712000-memory.dmp

    Filesize

    2.9MB

  • memory/1388-5-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

    Filesize

    32KB

  • memory/1388-6-0x000007FEF6260000-0x000007FEF6BFD000-memory.dmp

    Filesize

    9.6MB

  • memory/1388-7-0x0000000002510000-0x0000000002590000-memory.dmp

    Filesize

    512KB

  • memory/1388-8-0x000007FEF6260000-0x000007FEF6BFD000-memory.dmp

    Filesize

    9.6MB

  • memory/1388-9-0x0000000002510000-0x0000000002590000-memory.dmp

    Filesize

    512KB

  • memory/1388-10-0x0000000002510000-0x0000000002590000-memory.dmp

    Filesize

    512KB

  • memory/1388-11-0x0000000002510000-0x0000000002590000-memory.dmp

    Filesize

    512KB

  • memory/1388-12-0x000007FEF6260000-0x000007FEF6BFD000-memory.dmp

    Filesize

    9.6MB