Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
script.ps1
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
script.ps1
-
Size
109B
-
MD5
5fce09732813426e69db4eacd652144b
-
SHA1
974d58440bb73a10190736f7e2325929cf623565
-
SHA256
7c63764a658011d29cffd6d93a95c0405f70779df1fbe4dd3ce14825cba0cfb3
-
SHA512
4a23e95e33651ffb630fa2ea7b7024ba5fb26a1a6aad1c9582a81b393b0c938375ba23fb7b1af0fdcc1a6c9f5fda3a63e45b5f07835033ccd747c1cc79c38eec
Score
3/10
Malware Config
Signatures
-
pid Process 2196 powershell.exe -
Runs regedit.exe 1 IoCs
pid Process 2540 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2196 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 regedit.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2540 2196 powershell.exe 29 PID 2196 wrote to memory of 2540 2196 powershell.exe 29 PID 2196 wrote to memory of 2540 2196 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:2540
-