Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2024, 15:16 UTC

General

  • Target

    nrwncpwo.ps1

  • Size

    350B

  • MD5

    4dcabdc088c563712db30a16ed19dd52

  • SHA1

    5758984a8840f3af5624e1149b306e8efd9ae483

  • SHA256

    9353635f565f1a3b0c4caa28f268f30271e12709d921ea87969cd4e7d2b8c642

  • SHA512

    a84614600f27918ac5490360873128bf6a7b6a8181efc64608b1045913a9ddd27f18e1b3d175e68e2f64d221a08fd160b122a0e4f5540e5bb828c5be9a60e40f

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\nrwncpwo.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\attrib.exe
      "C:\Windows\system32\attrib.exe" +h C:/rimz
      2⤵
      • Views/modifies file attributes
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1804-5-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

    Filesize

    9.6MB

  • memory/1804-7-0x0000000002A40000-0x0000000002AC0000-memory.dmp

    Filesize

    512KB

  • memory/1804-6-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

    Filesize

    32KB

  • memory/1804-4-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/1804-8-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

    Filesize

    9.6MB

  • memory/1804-9-0x0000000002A40000-0x0000000002AC0000-memory.dmp

    Filesize

    512KB

  • memory/1804-10-0x0000000002A40000-0x0000000002AC0000-memory.dmp

    Filesize

    512KB

  • memory/1804-11-0x000007FEF5AF0000-0x000007FEF648D000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.