Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 20:32

General

  • Target

    drupal-6.19/includes/bootstrap.ps1

  • Size

    41KB

  • MD5

    d46e5c2bcdbd38f42793ef423df1ce14

  • SHA1

    dafbcf35f1413501b0ac2f8698abb3b9b7ee00b7

  • SHA256

    ee443078a0e8ab4ba62232b56b2b07aacf6c7775ee8335178b382224eae6c18c

  • SHA512

    5383df3bea2dd45f82d5bd7f2b1d7cae2d905d78b8ff97fbddf7b263ea6ef1b6156ae6f0c82431ece6222eb77c899d19df837f2154cfd10678c42c74f68bf0c3

  • SSDEEP

    384:ns8z6IRk1Vmqfu7Zz8Zy9v9cr2JgFIk/R7B5qfoH6h5JkxMnKxm82gOrFaOtE7IB:BDmF7B5qh50xt2g0TYx5E9pAGO4Aih28

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\drupal-6.19\includes\bootstrap.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2808-4-0x000007FEF5D6E000-0x000007FEF5D6F000-memory.dmp

    Filesize

    4KB

  • memory/2808-7-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-6-0x0000000002050000-0x0000000002058000-memory.dmp

    Filesize

    32KB

  • memory/2808-5-0x000000001B4D0000-0x000000001B7B2000-memory.dmp

    Filesize

    2.9MB

  • memory/2808-8-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-9-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-10-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-11-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/2808-12-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB