Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
ZAMOWIEN.EXE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZAMOWIEN.EXE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Sakset.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Sakset.ps1
Resource
win10v2004-20241007-en
General
-
Target
Sakset.ps1
-
Size
52KB
-
MD5
87d2841aab88bd011520d4b98298992f
-
SHA1
cbdf74d62edcca1c96f44929c396383a405252f8
-
SHA256
158c5134e2910f62d058a85124b81070ba5953276b7a0354ecb5fcc20db58b95
-
SHA512
98d6af4ebafdd61012e0e8daf6c73526e016783f710bda0a17be859d9e9bf7411e914ff531d93b276f206713d47612a252d5bf27329044f8c7fb1a096311a603
-
SSDEEP
1536:aTWK9EAa2SsfqrQwGXkNJAHBJOYhFQTWfT:aP9EOk0kshJNayT
Malware Config
Signatures
-
pid Process 696 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 696 powershell.exe 696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 2756 696 powershell.exe 30 PID 696 wrote to memory of 2756 696 powershell.exe 30 PID 696 wrote to memory of 2756 696 powershell.exe 30
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Sakset.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "696" "912"2⤵PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef69eb8ed6396d4aa8a231b919e10861
SHA1e62476588f296730f49c292d9db95ad35447ebb4
SHA2564beb23e16006dd3dc51a2ab5355ae9d4a7b3a51ee6b9197b213c50054b165f3e
SHA512665d3d0b56080c70a3c71831e6d22df11a0227ee7635835b830c2fb1610f147cadfef0be37de3b6f97fafdf1469ce17cc087bea19f4d8246fbc6e64b75c372ab