Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 01:46

General

  • Target

    admin.ps1

  • Size

    8KB

  • MD5

    ffc9868f76a5c0804f395ce39969f0bb

  • SHA1

    4d3dade64e1c9044b81826c8be852bea56fd95cd

  • SHA256

    fa6ad3b33c2c59e62a2be8535f45bdcbf528da2d460e7710a3b85b61a30fc832

  • SHA512

    a2e5b9e1e04771a2593111ab585db68d0928128c1e3609795838c9240278742b28b8ceda8682eefd47052ee303af828dedccfb45c4a36c78ca61d145c851f132

  • SSDEEP

    192:V9IiSqyVgVrwJRyCeZwBp3iyD/38msk3ktRh/kCi:V9u+rAyC3JDv8msk3wRh/Ni

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\admin.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-4-0x000007FEF62FE000-0x000007FEF62FF000-memory.dmp

    Filesize

    4KB

  • memory/2140-6-0x0000000002970000-0x0000000002978000-memory.dmp

    Filesize

    32KB

  • memory/2140-7-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2140-5-0x000000001B570000-0x000000001B852000-memory.dmp

    Filesize

    2.9MB

  • memory/2140-8-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2140-10-0x000000000289B000-0x0000000002902000-memory.dmp

    Filesize

    412KB

  • memory/2140-12-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2140-11-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2140-9-0x000007FEF6040000-0x000007FEF69DD000-memory.dmp

    Filesize

    9.6MB