Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/11/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
ccacb1863cfc340af0f45f145ac924ac57907cfadb199f8ba84c6429c43bba28.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ccacb1863cfc340af0f45f145ac924ac57907cfadb199f8ba84c6429c43bba28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jumblement.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jumblement.ps1
Resource
win10v2004-20241007-en
General
-
Target
Jumblement.ps1
-
Size
50KB
-
MD5
5f22e57b55aa6e31d0606fa12e0ee584
-
SHA1
e83cf829d2d46ce8a16f117a437a32ad63c1173d
-
SHA256
0fd8188279b05a111878389f3fe41f48f28d27249560005ae6977b0e8fb137b2
-
SHA512
7c9ed6698e7e593597c92169c5ea97447b786439c09f33e26877852fae74dbdd8082c463baa3f5fefea9b3bb05014999389ec8f306e055ed5c99338fe0335900
-
SSDEEP
1536:FfJI40kmkpIZNOVdVbTdiU0J/qK2ROiuBhJ9L:FfJ6lkqNYs3eO//
Malware Config
Signatures
-
pid Process 2036 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 powershell.exe 2036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2264 2036 powershell.exe 31 PID 2036 wrote to memory of 2264 2036 powershell.exe 31 PID 2036 wrote to memory of 2264 2036 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Jumblement.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2036" "872"2⤵PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5139859923d3020da40c2c58513386e54
SHA18b78dd1c7ba5f7a7efe388f80570dcc7bbb9c927
SHA2569a12a338314fb93b07b8bc6c979248e9d55de2275fdfa0062fa3d6cd89a7e411
SHA5124c3b3e69add05030fcc3eb499e44589fd1960f4371d9fd2a505a805a378e92961a5aeac44e80be6d7bc4f9900ed47431a8522f5b64b91b43b20e045c412a5383