Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 18:54

General

  • Target

    seosaserveradmin/classes/tools/Helpers/HelperDbSA.ps1

  • Size

    25KB

  • MD5

    db84c88aba67c0d9444eb76d21e4c358

  • SHA1

    a5679950f5baa08a0d43d2f3dccf06bc34300048

  • SHA256

    155c830ce3dbc85652acd7e20cb7df618abd95d34a36e0a09ec774bafc3652f6

  • SHA512

    03215c2f293cffbbaa6305e93ddffff7bdad004f6a0667f8a9fe8e708847b38b4a0265f3f22c177cb1b2d78bbbacaf61779a0c32d4e259785e1b0dae6a7d1e01

  • SSDEEP

    192:o62hfLct1HM4qamQk2OuCJ0WItuvA5dsbZHJ4zhMu6OYEL+gq8Qwfwh:+fLQHM4QzSWqsZlu6OYEL+gqR7

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\seosaserveradmin\classes\tools\Helpers\HelperDbSA.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2252-4-0x000007FEF542E000-0x000007FEF542F000-memory.dmp

    Filesize

    4KB

  • memory/2252-5-0x000000001B710000-0x000000001B9F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2252-6-0x0000000001E50000-0x0000000001E58000-memory.dmp

    Filesize

    32KB

  • memory/2252-7-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-8-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-9-0x0000000002CFB000-0x0000000002D62000-memory.dmp

    Filesize

    412KB

  • memory/2252-10-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2252-11-0x000007FEF5170000-0x000007FEF5B0D000-memory.dmp

    Filesize

    9.6MB