Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
a9ad4d827b3bb1456418880649b72ce1af036f33fdde1ca39a5f42e467eed842.ps1
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a9ad4d827b3bb1456418880649b72ce1af036f33fdde1ca39a5f42e467eed842.ps1
Resource
win10v2004-20240508-en
General
-
Target
a9ad4d827b3bb1456418880649b72ce1af036f33fdde1ca39a5f42e467eed842.ps1
-
Size
1KB
-
MD5
a1fcaac53ee113c0e636ab8e14168f57
-
SHA1
8e697b7740468593e70f7349f6299f05cc5358d0
-
SHA256
a9ad4d827b3bb1456418880649b72ce1af036f33fdde1ca39a5f42e467eed842
-
SHA512
e33e4f1ce2b54b30de3709873a9241c6599c82814c5e1589db1ce5516330a6d1d36d28359965be3ed659b31b250c62551c7e469d432929255361ed57812d84a6
Malware Config
Signatures
-
pid Process 3788 powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3788 powershell.exe 3788 powershell.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 3376 taskmgr.exe Token: SeSystemProfilePrivilege 3376 taskmgr.exe Token: SeCreateGlobalPrivilege 3376 taskmgr.exe Token: 33 3376 taskmgr.exe Token: SeIncBasePriorityPrivilege 3376 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe 3376 taskmgr.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a9ad4d827b3bb1456418880649b72ce1af036f33fdde1ca39a5f42e467eed842.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82