Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/06/2024, 07:20 UTC

240616-h6f2psycpm 10

16/06/2024, 07:20 UTC

240616-h6f2psvbka 10

16/06/2024, 07:20 UTC

240616-h6f2psycpl 10

16/06/2024, 07:20 UTC

240616-h6f2psycpk 10

16/06/2024, 07:20 UTC

240616-h6f2psvbjh 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnr 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnq 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnp 10

16/06/2024, 07:20 UTC

240616-h6fqyavbjg 10

16/06/2024, 07:20 UTC

240616-h6fqyaycnn 10

Analysis

  • max time kernel
    1795s
  • max time network
    1799s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 02:26 UTC

General

  • Target

    file01 - copia (9) - copia.ps1

  • Size

    462B

  • MD5

    5e2dca825bed214a14705357df13d8d6

  • SHA1

    04f20b1094e5e905bcbcdfc0f1279f6a6e2bbb9e

  • SHA256

    b45546367df23b2459a55ffa753ad4d66f8588263f87c339fb81cde87c3ffba4

  • SHA512

    70a31874a475560704829224c71d6e9f01d6dc3bfe5b1f453ff817753f7a6d1ed51249481cd14e8adae497ad6ddfbe8b4e9556556886dd97c9587b24b0701501

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\file01 - copia (9) - copia.ps1"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2952
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4136,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8
    1⤵
      PID:3420
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2376,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:8
      1⤵
        PID:3484

      Network

      • flag-us
        DNS
        github.com
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        github.com
        IN A
      • flag-us
        DNS
        github.com
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        github.com
        IN A
      • flag-us
        DNS
        github.com
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        github.com
        IN A
      • flag-us
        DNS
        github.com
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        github.com
        IN A
      • flag-us
        DNS
        github.com
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        github.com
        IN A
      • 52.142.223.178:80
        46 B
        1
      • 8.8.8.8:53
        github.com
        dns
        powershell.exe
        280 B
        5

        DNS Request

        github.com

        DNS Request

        github.com

        DNS Request

        github.com

        DNS Request

        github.com

        DNS Request

        github.com

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5rgaogaa.35r.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2952-0-0x00007FFC065C3000-0x00007FFC065C5000-memory.dmp

        Filesize

        8KB

      • memory/2952-6-0x0000025ACEDC0000-0x0000025ACEDE2000-memory.dmp

        Filesize

        136KB

      • memory/2952-11-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      • memory/2952-12-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      • memory/2952-13-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      • memory/2952-14-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      • memory/2952-15-0x00007FFC065C3000-0x00007FFC065C5000-memory.dmp

        Filesize

        8KB

      • memory/2952-16-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      • memory/2952-17-0x00007FFC065C0000-0x00007FFC07081000-memory.dmp

        Filesize

        10.8MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.