Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/11/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ccacb1863cfc340af0f45f145ac924ac57907cfadb199f8ba84c6429c43bba28.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccacb1863cfc340af0f45f145ac924ac57907cfadb199f8ba84c6429c43bba28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jumblement.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jumblement.ps1
Resource
win10v2004-20241007-en
General
-
Target
Jumblement.ps1
-
Size
50KB
-
MD5
5f22e57b55aa6e31d0606fa12e0ee584
-
SHA1
e83cf829d2d46ce8a16f117a437a32ad63c1173d
-
SHA256
0fd8188279b05a111878389f3fe41f48f28d27249560005ae6977b0e8fb137b2
-
SHA512
7c9ed6698e7e593597c92169c5ea97447b786439c09f33e26877852fae74dbdd8082c463baa3f5fefea9b3bb05014999389ec8f306e055ed5c99338fe0335900
-
SSDEEP
1536:FfJI40kmkpIZNOVdVbTdiU0J/qK2ROiuBhJ9L:FfJ6lkqNYs3eO//
Malware Config
Signatures
-
pid Process 2896 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 powershell.exe 2896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2896 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1708 2896 powershell.exe 29 PID 2896 wrote to memory of 1708 2896 powershell.exe 29 PID 2896 wrote to memory of 1708 2896 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jumblement.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2896" "852"2⤵PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57a6d31241d936457ef59d63961bf6892
SHA1c785d2804da9ed0d339d23bdea125f718208207a
SHA256a07c9f48c7b042664554ba7ec0dfc17a9e0203650ed8c4de9c8a26719f9ccb0b
SHA512f30c91eda14ee60b703cbb2a79c10a578ee15f2f704ca33bb9c6b67242ea3d08b81dc986b89776677e14af986e77125920ca8d747de8b03772c7dd8041ca4b5d