Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 02:35

General

  • Target

    66c4a56e96ab90c7b672dfb8a238a2c0N.ps1

  • Size

    685KB

  • MD5

    66c4a56e96ab90c7b672dfb8a238a2c0

  • SHA1

    6085884e21931554311664724f2c58d81312ed8e

  • SHA256

    66ddc48b67efc492b819cce8eb88db85699b98ea94d5941cbb8a4cd682bb385e

  • SHA512

    e98b839173f3c140ae98685eb7726c529d5caa04ce21f7dcccf9046ffa7d53214ee4d5ba6de8c764e0c45e8ed0679525ab624d3a4a4098c08ecc6aec31a7cf30

  • SSDEEP

    12288:8ppYXT60Mv5a8kebcetZ3Aq7dIzWokCUxEgf/AxHhICOk2imcMsk:fXWZ5PbcqdIzWokCiHovICOk2/D

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\66c4a56e96ab90c7b672dfb8a238a2c0N.ps1
    1⤵
    • Blocklisted process makes network request
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1x-ngzq8.cmdline"
      2⤵
        PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2268-4-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

      Filesize

      4KB

    • memory/2268-6-0x0000000001F00000-0x0000000001F08000-memory.dmp

      Filesize

      32KB

    • memory/2268-5-0x000000001B760000-0x000000001BA42000-memory.dmp

      Filesize

      2.9MB

    • memory/2268-7-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2268-8-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2268-9-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2268-10-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2268-11-0x000007FEF6C40000-0x000007FEF75DD000-memory.dmp

      Filesize

      9.6MB

    • memory/2268-12-0x000007FEF6EFE000-0x000007FEF6EFF000-memory.dmp

      Filesize

      4KB