Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
185.7.214_1.211.ps1
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
185.7.214_1.211.ps1
-
Size
748B
-
MD5
e82a3ff48366e1f36544a3da3cabc703
-
SHA1
84796eb3285b20787b8b17765e73b7180b4931d0
-
SHA256
4a6a052cca2e26577c7e07e513a33ae7f147bfdcbbed22e3ad6ee36d4c66850e
-
SHA512
87fe6cf2aa4925e39274a7279b2349ff8aeebcd68c73a6561d3d456960b9bca8b5c0722aa0c2712804c4538793f4c1cce9ff3be3904bbd891599979e963d6173
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1560 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 4 1560 powershell.exe -
pid Process 1560 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1560 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1560 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\185.7.214_1.211.ps11⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560