Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
BSSAClientSetup7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
BSSAClientSetup7.exe
Resource
win10v2004-20230703-en
General
-
Target
BSSAClientSetup7.exe
-
Size
14.4MB
-
MD5
ee91d6b6497a5f7cf87435e00687d956
-
SHA1
71b172e94b84224a81b2b469b86fff81af08559e
-
SHA256
b7ea0e724c8e17732eceedf7e497416e2c7a3a91ab9c2b200de3f180a9cca24d
-
SHA512
efbd5d666efce148fed103b7781c207bda23bb4bb4995fad462ac78371a280d17921125de9c8294790ec0b03a129e1c3bdc17acfa9e4e9c106f6fd794801b178
-
SSDEEP
393216:YHfz9Zd79AL4eWbJHLiOdcDKPo4/q5e/0:Y79vhAL8HLBaGAK8
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2380 BSSAClientSetup7.tmp -
Loads dropped DLL 3 IoCs
pid Process 1988 BSSAClientSetup7.exe 2380 BSSAClientSetup7.tmp 2380 BSSAClientSetup7.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2956 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2924 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 BSSAClientSetup7.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 taskkill.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 1988 wrote to memory of 2380 1988 BSSAClientSetup7.exe 28 PID 2380 wrote to memory of 2956 2380 BSSAClientSetup7.tmp 29 PID 2380 wrote to memory of 2956 2380 BSSAClientSetup7.tmp 29 PID 2380 wrote to memory of 2956 2380 BSSAClientSetup7.tmp 29 PID 2380 wrote to memory of 2956 2380 BSSAClientSetup7.tmp 29 PID 2380 wrote to memory of 2924 2380 BSSAClientSetup7.tmp 31 PID 2380 wrote to memory of 2924 2380 BSSAClientSetup7.tmp 31 PID 2380 wrote to memory of 2924 2380 BSSAClientSetup7.tmp 31 PID 2380 wrote to memory of 2924 2380 BSSAClientSetup7.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\is-9I375.tmp\BSSAClientSetup7.tmp"C:\Users\Admin\AppData\Local\Temp\is-9I375.tmp\BSSAClientSetup7.tmp" /SL5="$80120,14868872,52736,C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" stop NetSpeedGuard3⤵
- Launches sc.exe
PID:2956
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /F /IM NetSpeedGuardTip.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640