Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3nmap-7.60/...32.dll
windows7-x64
1nmap-7.60/...32.dll
windows10-2004-x64
1nmap-7.60/libssh2.dll
windows7-x64
3nmap-7.60/libssh2.dll
windows10-2004-x64
3nmap-7.60/ncat.exe
windows7-x64
1nmap-7.60/ncat.exe
windows10-2004-x64
1nmap-7.60/ndiff.bat
windows7-x64
1nmap-7.60/ndiff.bat
windows10-2004-x64
1nmap-7.60/ndiff.py
ubuntu-18.04-amd64
1nmap-7.60/ndiff.py
debian-9-armhf
1nmap-7.60/ndiff.py
debian-9-mips
1nmap-7.60/ndiff.py
debian-9-mipsel
1nmap-7.60/...te.exe
windows7-x64
1nmap-7.60/...te.exe
windows10-2004-x64
1nmap-7.60/nmap.exe
windows7-x64
1nmap-7.60/nmap.exe
windows10-2004-x64
1nmap-7.60/...93.exe
windows7-x64
7nmap-7.60/...93.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DiagReport.bat
windows7-x64
1DiagReport.bat
windows10-2004-x64
1DiagReport.ps1
windows7-x64
1DiagReport.ps1
windows10-2004-x64
1NPFInstall.exe
windows7-x64
4NPFInstall.exe
windows10-2004-x64
4NPFInstall2.exe
windows7-x64
4NPFInstall2.exe
windows10-2004-x64
4nmap-7.60/nping.exe
windows7-x64
1nmap-7.60/nping.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
nmap-7.60/libeay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nmap-7.60/libeay32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
nmap-7.60/libssh2.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
nmap-7.60/libssh2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
nmap-7.60/ncat.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
nmap-7.60/ncat.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
nmap-7.60/ndiff.bat
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nmap-7.60/ndiff.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
nmap-7.60/ndiff.py
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral10
Sample
nmap-7.60/ndiff.py
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral11
Sample
nmap-7.60/ndiff.py
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral12
Sample
nmap-7.60/ndiff.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
nmap-7.60/nmap-update.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
nmap-7.60/nmap-update.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
nmap-7.60/nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
nmap-7.60/nmap.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
nmap-7.60/npcap-0.93.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
nmap-7.60/npcap-0.93.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
DiagReport.bat
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
DiagReport.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
DiagReport.ps1
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
DiagReport.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
NPFInstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
NPFInstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
NPFInstall2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
NPFInstall2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
nmap-7.60/nping.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nmap-7.60/nping.exe
Resource
win10v2004-20240412-en
General
-
Target
DiagReport.ps1
-
Size
8KB
-
MD5
7457f5e88035d91752f988df57aa0689
-
SHA1
8cbd43f00fdc2ae2b0ac7429454eb7708031ee70
-
SHA256
4180f15d32e84d1f3ed1c256bdc86f73d96e6615b3a10bf67bfc50c30a9912ed
-
SHA512
2ccfe0eb0724461fc123f9693724386426497ed7236a5180475223528610216dab9f5b4d61a53dc6882322aec3414b7b9a1c39d651a6a289ba40e29d51575916
-
SSDEEP
96:4g+14dBdsaHQCMMavbtBG7IYMGOUU+Sz1ROVP7BNE9dn:4x4dBdsaHQZMay6W1X3Kh
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 powershell.exe 5016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 5016 powershell.exe Token: SeIncreaseQuotaPrivilege 5016 powershell.exe Token: SeSecurityPrivilege 5016 powershell.exe Token: SeTakeOwnershipPrivilege 5016 powershell.exe Token: SeLoadDriverPrivilege 5016 powershell.exe Token: SeSystemProfilePrivilege 5016 powershell.exe Token: SeSystemtimePrivilege 5016 powershell.exe Token: SeProfSingleProcessPrivilege 5016 powershell.exe Token: SeIncBasePriorityPrivilege 5016 powershell.exe Token: SeCreatePagefilePrivilege 5016 powershell.exe Token: SeBackupPrivilege 5016 powershell.exe Token: SeRestorePrivilege 5016 powershell.exe Token: SeShutdownPrivilege 5016 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeSystemEnvironmentPrivilege 5016 powershell.exe Token: SeRemoteShutdownPrivilege 5016 powershell.exe Token: SeUndockPrivilege 5016 powershell.exe Token: SeManageVolumePrivilege 5016 powershell.exe Token: 33 5016 powershell.exe Token: 34 5016 powershell.exe Token: 35 5016 powershell.exe Token: 36 5016 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1428 5016 powershell.exe 93 PID 5016 wrote to memory of 1428 5016 powershell.exe 93
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\DiagReport.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" C:\Users\Admin\AppData\Local\Temp\DiagReport-20240420-062741.txt2⤵PID:1428
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD56ab4982d6b6180318dec7dfc7419ea53
SHA139dbfb9082ac9188f94b54f78d91e4305bca5b83
SHA25683b7f8ea4f87cfd393df7279ebac5a02b5687bb62f5193f9a1a020d8986442fa
SHA512f79978c6dc6fda67b82580b3a102204991e21db7f0c76e8ce6b78fe807f6ae40d15ce1d4a6833a916b526efba26ec40527d819d41137c3d406928b804738e0b1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82