Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 12:34 UTC

General

  • Target

    StartingScriptWrapper.ps1

  • Size

    14KB

  • MD5

    da5bf3010154020db9db4cf8832b42ea

  • SHA1

    15ba3dc3bbcb16a26839862d79b3519e74a5e03a

  • SHA256

    7778c658411a2f1649ced14cdfe8a92145c1c7fa53b1ce5b14920000fe99bd98

  • SHA512

    d70c6df571a069797f5eb1ac9a3e30293914b8f1378714e97ae0b881ee5a833f0944ee7246e2768ed74747637deade85306e837a25b1757a1bc3abb7d6eaa9e2

  • SSDEEP

    384:wrBzBV4OHcvFcYlu2V8uMcg5apqpBw2qFA5WFQExxR/c/mZ1:KBr4DSYlu2VzMcgwgBLqJQO/ceD

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\StartingScriptWrapper.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2084-4-0x000007FEF5D0E000-0x000007FEF5D0F000-memory.dmp

    Filesize

    4KB

  • memory/2084-5-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

    Filesize

    2.9MB

  • memory/2084-6-0x0000000002290000-0x0000000002298000-memory.dmp

    Filesize

    32KB

  • memory/2084-7-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-8-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-10-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-9-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-11-0x000007FEF5A50000-0x000007FEF63ED000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.