Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2024, 15:31

General

  • Target

    payload_x86.ps1

  • Size

    3KB

  • MD5

    194d1495881b3eb9703f20e7d48eaefd

  • SHA1

    688fcec91893ad30ea12c116466436acce00ded4

  • SHA256

    440483f6bcb2ff8dca2d44e715f72db314056ad7e90ccb48135ad5c9a8c0f578

  • SHA512

    95655c3fdb248cd59b0e5d3789d283e602722a51c4692af6a9a025abcc9e2324697d3e8dde42724a637605fa6853c7e17f0d82e8e190fd57100066844a08fe1b

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\payload_x86.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • \??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
      "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8G0Z8UL8P46LNQFUCFY7.temp

    Filesize

    7KB

    MD5

    777b29173036948cb58746416f10c588

    SHA1

    9e8a1d02acacfba6d0fc2a9b49eb66fa127da92d

    SHA256

    ad2d79e4f7512238f0e7e6f344618ce4bc11cbe696ccc3a09730416550b8510d

    SHA512

    2a0b9e685d306e5075aec33d60f98a0a2f0fb093229525d64ede9dda563038e00d27396aa4e331fbdb5798ce30f96a9cc87b9286182b8aed7be7cf3d3999bf6c

  • memory/2072-13-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-11-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-7-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-8-0x000000001BC40000-0x000000001BC72000-memory.dmp

    Filesize

    200KB

  • memory/2072-10-0x000000001BC40000-0x000000001BC72000-memory.dmp

    Filesize

    200KB

  • memory/2072-4-0x000007FEF59DE000-0x000007FEF59DF000-memory.dmp

    Filesize

    4KB

  • memory/2072-12-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-6-0x0000000002630000-0x0000000002638000-memory.dmp

    Filesize

    32KB

  • memory/2072-9-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-5-0x000000001B630000-0x000000001B912000-memory.dmp

    Filesize

    2.9MB

  • memory/2072-16-0x000007FEF59DE000-0x000007FEF59DF000-memory.dmp

    Filesize

    4KB

  • memory/2072-17-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-18-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB

  • memory/2072-19-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

    Filesize

    9.6MB