Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
nxcxgekw.ps1
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
nxcxgekw.ps1
-
Size
596B
-
MD5
40d4e31bc0a65dda584890fc09c939c7
-
SHA1
531b883c8bbf84dd7e22493b324b384ee2f60047
-
SHA256
ae81a758cb103d6b9c8495930c1478812ee57655b820be2558c1a7d81f4713c8
-
SHA512
ab0cf1333cfd050bccf6efb47830c3b4339ab26444c407dae134991c4423181ba131e2e2b84ded6bd1828b1ac2d338dcdb80ebf8cb8af524f66f74278e49d0b6
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1032 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1508 1032 powershell.exe 29 PID 1032 wrote to memory of 1508 1032 powershell.exe 29 PID 1032 wrote to memory of 1508 1032 powershell.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1508 attrib.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\nxcxgekw.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\attrib.exe"C:\Windows\system32\attrib.exe" +h C:/yten/2⤵
- Views/modifies file attributes
PID:1508
-