Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2023, 18:31

General

  • Target

    setupBKISrv5S.exe

  • Size

    1.3MB

  • MD5

    e1b36d307f9bc01f2ca81316da00cbcd

  • SHA1

    c8d6b3a4f988efab0e01f2ed8ba9dce8edaf4595

  • SHA256

    431c267c1dfadb1e05713c3ebebfb4feddee988b1b30232facf8cd76064e0e1b

  • SHA512

    e3c43e18ef54aec3faf6f96a050d5bbfc8e91628709954812a195b940eee1f09e920e4dbe25338d7c64b3e4aae3f24a6cd12bdedc988fc9f1688906b6dd423b5

  • SSDEEP

    24576:YVu+pYnOHCEcoc3EYekNudik90C5OzFYT6Vmsfht6uhsEnpr0eIvTI/nQP5y:YVu+pYnOYHz9kZgzFVVBJt6u2Enpr0HO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setupBKISrv5S.exe
    "C:\Users\Admin\AppData\Local\Temp\setupBKISrv5S.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\INS9A22.tmp
      C:\Users\Admin\AppData\Local\Temp\INS9A22.tmp /SL3 $9002C C:\Users\Admin\AppData\Local\Temp\setupBKISrv5S.exe 1390159 1393338 61952
      2⤵
      • Executes dropped EXE
      PID:3484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INS9A22.tmp

    Filesize

    377KB

    MD5

    ec2a3559ef793d976d3f72252ade0b68

    SHA1

    1673ad41b3683d9fde4e331ef97711af05c4c014

    SHA256

    995ca25e8ac883429e67e2985887c2dc122e4d3cca48d6ab5b545e6a896ae2e1

    SHA512

    a9f77b1735eb88e3ed790a0bb00637a616c33414cbb6f0b582322759a3bea3bf2fd7a334f92c17dd9f1669acdacc7551611ecedb80c11e999ddd120f104355b1

  • C:\Users\Admin\AppData\Local\Temp\INS9A22.tmp

    Filesize

    377KB

    MD5

    ec2a3559ef793d976d3f72252ade0b68

    SHA1

    1673ad41b3683d9fde4e331ef97711af05c4c014

    SHA256

    995ca25e8ac883429e67e2985887c2dc122e4d3cca48d6ab5b545e6a896ae2e1

    SHA512

    a9f77b1735eb88e3ed790a0bb00637a616c33414cbb6f0b582322759a3bea3bf2fd7a334f92c17dd9f1669acdacc7551611ecedb80c11e999ddd120f104355b1

  • memory/452-141-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3484-140-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/3484-142-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB