Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3WindowsPow...ng.ps1
windows7-x64
1WindowsPow...ng.ps1
windows10-2004-x64
1WindowsPow...up.dll
windows7-x64
1WindowsPow...up.dll
windows10-2004-x64
1WindowsPow...nt.ps1
windows7-x64
1WindowsPow...nt.ps1
windows10-2004-x64
1WindowsPow...ps1xml
windows7-x64
3WindowsPow...ps1xml
windows10-2004-x64
7WindowsPow...ps1xml
windows7-x64
3WindowsPow...ps1xml
windows10-2004-x64
7WindowsPow...ps1xml
windows7-x64
3WindowsPow...ps1xml
windows10-2004-x64
7WindowsPow...ew.ps1
windows7-x64
1WindowsPow...ew.ps1
windows10-2004-x64
4WindowsPow...se.ps1
windows7-x64
1WindowsPow...se.ps1
windows10-2004-x64
1WindowsPow...PS.ps1
windows7-x64
1WindowsPow...PS.ps1
windows10-2004-x64
1WindowsPow...sh.dll
windows7-x64
1WindowsPow...sh.dll
windows10-2004-x64
1WindowsPow...il.dll
windows10-2004-x64
1WindowsPow...ds.dll
windows7-x64
1WindowsPow...ds.dll
windows10-2004-x64
1WindowsPow...es.dll
windows7-x64
1WindowsPow...es.dll
windows10-2004-x64
1WindowsPow...ve.ps1
windows7-x64
1WindowsPow...ve.ps1
windows10-2004-x64
1WindowsPow...ps1xml
windows7-x64
3WindowsPow...ps1xml
windows10-2004-x64
7WindowsPow...ps1xml
windows7-x64
3WindowsPow...ps1xml
windows10-2004-x64
7WindowsPow...ps1xml
windows7-x64
3Resubmissions
15/04/2024, 17:37
240415-v66nksed8w 715/04/2024, 17:34
240415-v5ll1sed3z 715/04/2024, 17:30
240415-v3fmzsca66 315/04/2024, 17:27
240415-v1vdcseb8w 7Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
WindowsPowerShell/v1.0/Modules/ConfigDefenderPerformance/MSFT_MpPerformanceRecording.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WindowsPowerShell/v1.0/Modules/ConfigDefenderPerformance/MSFT_MpPerformanceRecording.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
WindowsPowerShell/v1.0/Modules/DnsClient/dnslookup.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
WindowsPowerShell/v1.0/Modules/DnsClient/dnslookup.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/EventTracingManagement.ps1
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/EventTracingManagement.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_AutologgerConfig_v1.0.format.ps1xml
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_AutologgerConfig_v1.0.format.ps1xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_EtwTraceProvider_v1.0.format.ps1xml
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_EtwTraceProvider_v1.0.format.ps1xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_EtwTraceSession_v1.0.format.ps1xml
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
WindowsPowerShell/v1.0/Modules/EventTracingManagement/MSFT_EtwTraceSession_v1.0.format.ps1xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
WindowsPowerShell/v1.0/Modules/Get-NetView/Get-NetView.ps1
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
WindowsPowerShell/v1.0/Modules/Get-NetView/Get-NetView.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
WindowsPowerShell/v1.0/Modules/ISE/ise.ps1
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
WindowsPowerShell/v1.0/Modules/ISE/ise.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
WindowsPowerShell/v1.0/Modules/LAPS/LAPS.ps1
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
WindowsPowerShell/v1.0/Modules/LAPS/LAPS.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
WindowsPowerShell/v1.0/Modules/LAPS/lapspsh.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
WindowsPowerShell/v1.0/Modules/LAPS/lapspsh.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
WindowsPowerShell/v1.0/Modules/LAPS/lapsutil.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
WindowsPowerShell/v1.0/Modules/LanguagePackManagement/Microsoft.LanguagePackManagement.Powershell.Commands.dll
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
WindowsPowerShell/v1.0/Modules/LanguagePackManagement/Microsoft.LanguagePackManagement.Powershell.Commands.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
WindowsPowerShell/v1.0/Modules/LanguagePackManagement/en/Microsoft.LanguagePackManagement.Powershell.Commands.Resources.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
WindowsPowerShell/v1.0/Modules/LanguagePackManagement/en/Microsoft.LanguagePackManagement.Powershell.Commands.Resources.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
WindowsPowerShell/v1.0/Modules/Microsoft.PowerShell.Archive/Microsoft.PowerShell.Archive.ps1
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
WindowsPowerShell/v1.0/Modules/Microsoft.PowerShell.Archive/Microsoft.PowerShell.Archive.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventNetworkAdapter.format.ps1xml
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventNetworkAdapter.format.ps1xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventPacketCaptureProvider.format.ps1xml
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventPacketCaptureProvider.format.ps1xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventProvider.format.ps1xml
Resource
win7-20240221-en
General
-
Target
WindowsPowerShell/v1.0/Modules/NetEventPacketCapture/MSFT_NetEventPacketCaptureProvider.format.ps1xml
-
Size
5KB
-
MD5
906b713599d6e8e21ab96765873375e9
-
SHA1
b97260e1bd73a540094993257ed9c6ac5b37e6a0
-
SHA256
2d57220046856b8a8df9a687ffd13f8b89c9d8e0edaabd0bba96c2e9159849c4
-
SHA512
24c9e411bda020c25e80a13fce3a162d5e57f6226092ce53d536011ea6f3766b373a8867c53e827d45ccf309dcafbda646546683e299b432bee6da06ad97bafc
-
SSDEEP
24:JdJlhPRlEPTxnuIkTVBvxlnJPRlE9BBBBBBBBBBBBIRpnWIEjVpbU:3Jlh5lexnHkpB5lJ5lRpnPEZp4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2992 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2992 1680 cmd.exe 87 PID 1680 wrote to memory of 2992 1680 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WindowsPowerShell\v1.0\Modules\NetEventPacketCapture\MSFT_NetEventPacketCaptureProvider.format.ps1xml1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\WindowsPowerShell\v1.0\Modules\NetEventPacketCapture\MSFT_NetEventPacketCaptureProvider.format.ps1xml2⤵
- Opens file in notepad (likely ransom note)
PID:2992
-