Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

15/04/2024, 17:37

240415-v66nksed8w 7

15/04/2024, 17:34

240415-v5ll1sed3z 7

15/04/2024, 17:30

240415-v3fmzsca66 3

15/04/2024, 17:27

240415-v1vdcseb8w 7

Analysis

  • max time kernel
    29s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 17:34

General

  • Target

    WindowsPowerShell/v1.0/Modules/Microsoft.PowerShell.LocalAccounts/1.0.0.0/Microsoft.PowerShell.LocalAccounts.psd1

  • Size

    1KB

  • MD5

    c69d3853e5bce7c695c5bd37ba96d699

  • SHA1

    6a79df1e70dbad4a0aa971823f85206a8d5faf8c

  • SHA256

    cda4e020d5a53973f1290db25cad7e2cb746993d4fd12a68431db54681afd0cc

  • SHA512

    524ec61d1056a98a3b4436b045d097988cb7723d0441e5721c1136f83c5240be233633e9fc1bf74dfc080a4d7e6c5198709ea76f2bf00dfa7c49be8a1639bf73

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\System32\notepad.exe
    "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.psd1"
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads