Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20240705-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
script.ps1
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
script.ps1
-
Size
2KB
-
MD5
1641d61c0ffa598b6447c6de38a13042
-
SHA1
b5161f0668e9440640fd7f1ac645efae19d29d6b
-
SHA256
feb37ecff8e4d5aaa7a5c9678e7ecf432c99a2c90c5b877aa3d4b774e148938c
-
SHA512
40d985f16730fd6cffa9eba2b1fc9118b5fbe78bd6a37395a307f8a99eab3645634908588306006918a7b43cf1a951789a36bd60285efa062b7916e98f9ac54b
Score
3/10
Malware Config
Signatures
-
pid Process 2760 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2760 powershell.exe Token: 33 2928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2928 AUDIODG.EXE Token: 33 2928 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2928 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2664 2760 powershell.exe 34 PID 2760 wrote to memory of 2664 2760 powershell.exe 34 PID 2760 wrote to memory of 2664 2760 powershell.exe 34
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" /r /t:102⤵PID:2664
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2596
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\robux.exe.infected1⤵
- Modifies registry class
PID:504