Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 02:49 UTC

General

  • Target

    c1c622dd11fd5ef3adfca6682db7639790ec048ddce7075c837cd8458fa763fb.ps1

  • Size

    2.7MB

  • MD5

    af5ba6f16dfb4a2e5ec62cd539400aa7

  • SHA1

    9ff2b2d1a5501b1e295a09e842f49af9a846ec63

  • SHA256

    c1c622dd11fd5ef3adfca6682db7639790ec048ddce7075c837cd8458fa763fb

  • SHA512

    926ce90e319ec3aa9ca10ef6c9b0a5d8daa88f804255f0e433bd9cd4609839bf1539c404e82740c6156296c2987125c65737d2930851bf9dfbb358752b228cdb

  • SSDEEP

    12288:pgUEuxWW+ZMcV1vvLWrG/JPsSCP+XqyPpXmfp8SQMjQ7IOvRcypukrmyZYKH8hyH:eU6jkmRl8hwNu1aQ9SbNnDIDE

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\c1c622dd11fd5ef3adfca6682db7639790ec048ddce7075c837cd8458fa763fb.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1376-4-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

    Filesize

    2.9MB

  • memory/1376-6-0x000007FEF5030000-0x000007FEF59CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1376-7-0x0000000002840000-0x00000000028C0000-memory.dmp

    Filesize

    512KB

  • memory/1376-5-0x0000000001F40000-0x0000000001F48000-memory.dmp

    Filesize

    32KB

  • memory/1376-8-0x000007FEF5030000-0x000007FEF59CD000-memory.dmp

    Filesize

    9.6MB

  • memory/1376-9-0x0000000002840000-0x00000000028C0000-memory.dmp

    Filesize

    512KB

  • memory/1376-10-0x0000000002840000-0x00000000028C0000-memory.dmp

    Filesize

    512KB

  • memory/1376-11-0x0000000002840000-0x00000000028C0000-memory.dmp

    Filesize

    512KB

  • memory/1376-12-0x000007FEF5030000-0x000007FEF59CD000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.