Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 19:44 UTC

General

  • Target

    deimos.ps1

  • Size

    266KB

  • MD5

    78284ae33b93caf7d4dca169bead6818

  • SHA1

    f5f557ebd67e09b6035f5c3741302248edc9fa73

  • SHA256

    241131b0b79e8047f27fd1b6e05ea7acd08ba4ed39222d398e3069ae5318b84e

  • SHA512

    efe782b977d2702ae9b015e0b902986aa37a29b829fe25c3d0b0bfef155ec201b241c806e891c894881bc57a229adbfc409a60a21486202070c40c1fdc859b33

  • SSDEEP

    6144:Ss/r0Kdpao8KNmoGjJLgJYg5EmjVmyeFfc2EIdZDyiDgOohr:b/zdpvahLg2wEqVmye22EygYIr

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\deimos.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2056-4-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/2056-5-0x000000001B5A0000-0x000000001B882000-memory.dmp

    Filesize

    2.9MB

  • memory/2056-6-0x0000000002870000-0x0000000002878000-memory.dmp

    Filesize

    32KB

  • memory/2056-7-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-8-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-9-0x000000001B4D0000-0x000000001B4DC000-memory.dmp

    Filesize

    48KB

  • memory/2056-10-0x000000001B4E0000-0x000000001B4FC000-memory.dmp

    Filesize

    112KB

  • memory/2056-11-0x000000001B500000-0x000000001B50E000-memory.dmp

    Filesize

    56KB

  • memory/2056-12-0x000000001BC90000-0x000000001BCEA000-memory.dmp

    Filesize

    360KB

  • memory/2056-13-0x000000001C6A0000-0x000000001C776000-memory.dmp

    Filesize

    856KB

  • memory/2056-14-0x000000001C780000-0x000000001C806000-memory.dmp

    Filesize

    536KB

  • memory/2056-15-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-17-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-16-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-18-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-19-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-20-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/2056-21-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-22-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2056-23-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.