Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 16:44

General

  • Target

    Synligeres.ps1

  • Size

    50KB

  • MD5

    1b3d6301bfb47cc724b472b5d7c9f94f

  • SHA1

    2d6e1d5efe83eb495f7022ef1ecfc0726fc2406c

  • SHA256

    246696dc09994f4e4160a8ed84c0e4b22bdc6719653bf9928510f7577d9d60ab

  • SHA512

    ec48e3f164e4b49fd4234807773113285e009d1ae12317ae2899642c28f55cd0c0344d4d2de7eed490c81cabe4be292e594eef35801c2fe99bf1c15a160e48fe

  • SSDEEP

    1536:Q1zXl+xVD98H4h9GiTyzTKHX9EQcv/yHhKB0gLQ:Q1z1eSH09xTyzTbpST

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Synligeres.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "2044" "908"
      2⤵
        PID:2028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259446160.txt

      Filesize

      1KB

      MD5

      964aaa720f974145023f33a3a4fea121

      SHA1

      325889642fc7bd241f24d99723cde61ee23841e9

      SHA256

      5cde142d006a9ec3cc99a3f11afa9e7867d60708f858e8132a0cc51dbf1b1e2e

      SHA512

      7b7c35b74de4b53fb527068790e6d5d7eff8991f7d66412b55bba3a4bec19f44603bd2c66217df59e5e484c954ae1ba3b1c21c6ea8932d55667cc4d9312a9f41

    • memory/2044-10-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-7-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-5-0x000000001B230000-0x000000001B512000-memory.dmp

      Filesize

      2.9MB

    • memory/2044-8-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-9-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-4-0x000007FEF595E000-0x000007FEF595F000-memory.dmp

      Filesize

      4KB

    • memory/2044-11-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-12-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-13-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-14-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-15-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB

    • memory/2044-6-0x0000000002120000-0x0000000002128000-memory.dmp

      Filesize

      32KB

    • memory/2044-18-0x000007FEF56A0000-0x000007FEF603D000-memory.dmp

      Filesize

      9.6MB