Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
Analysis
-
max time kernel
357s -
max time network
358s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
target.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
target.ps1
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
target.ps1
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
target.ps1
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
target.ps1
Resource
macos-20240410-en
General
-
Target
target.ps1
-
Size
674B
-
MD5
2445a2447a027ec6b461d894a6890bae
-
SHA1
9fb690c85f53168efab9f865e4834fd030ca2ad9
-
SHA256
05e1cbf3c0dddf9c571689f5052661b31b29850722a2c315c54216fb05b55f6e
-
SHA512
89f0bc82e70ef1e95bfbd5f78e60c900161b2445f22b5b84056fbaa93991f5e9a0a67bfea8740a407d06945a015993aebb8ab2b2db3c602cc4af25c2949d5607
Malware Config
Signatures
-
pid Process 968 powershell.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2812 ipconfig.exe 2556 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 968 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 968 wrote to memory of 2812 968 powershell.exe 29 PID 968 wrote to memory of 2812 968 powershell.exe 29 PID 968 wrote to memory of 2812 968 powershell.exe 29 PID 968 wrote to memory of 2556 968 powershell.exe 30 PID 968 wrote to memory of 2556 968 powershell.exe 30 PID 968 wrote to memory of 2556 968 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\target.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Gathers network information
PID:2812
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" info2⤵
- Gathers network information
PID:2556
-