Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    12s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2025, 18:04

General

  • Target

    Assets/Audio/Creatures/Moose/Moose2.ps1

  • Size

    21KB

  • MD5

    103390a32f727ba50eb75248803a1b14

  • SHA1

    666247d525deeb6edf12388703a2413a38a04d79

  • SHA256

    faaf70fef31d8d18c913cba8bbf0f60930231537544c6189f07c00d5350f3e82

  • SHA512

    9cec79833d9193c2960c13915f208b08446073cba5cbd6fece37ba19221c0462f33357833cdfc171343e07bd5f35d4b5a0e003868e2550dd67c8af83cc5a2d66

  • SSDEEP

    384:tg0YDTuph4qV6ShFyFBizLSUTu5qYqjO3tfKiCySWvQch5l6j2nlQi4jR8NhmmdC:S7HghVRhFCBizLSUTu5/VJKiCvW4cRmF

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Assets\Audio\Creatures\Moose\Moose2.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2424-4-0x000007FEF620E000-0x000007FEF620F000-memory.dmp

    Filesize

    4KB

  • memory/2424-5-0x000000001B2F0000-0x000000001B5D2000-memory.dmp

    Filesize

    2.9MB

  • memory/2424-6-0x0000000002410000-0x0000000002418000-memory.dmp

    Filesize

    32KB

  • memory/2424-7-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-8-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-9-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-10-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-11-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2424-12-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

    Filesize

    9.6MB