Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
BSSAClientSetup7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
BSSAClientSetup7.exe
Resource
win10v2004-20230703-en
General
-
Target
BSSAClientSetup7.exe
-
Size
14.4MB
-
MD5
ee91d6b6497a5f7cf87435e00687d956
-
SHA1
71b172e94b84224a81b2b469b86fff81af08559e
-
SHA256
b7ea0e724c8e17732eceedf7e497416e2c7a3a91ab9c2b200de3f180a9cca24d
-
SHA512
efbd5d666efce148fed103b7781c207bda23bb4bb4995fad462ac78371a280d17921125de9c8294790ec0b03a129e1c3bdc17acfa9e4e9c106f6fd794801b178
-
SSDEEP
393216:YHfz9Zd79AL4eWbJHLiOdcDKPo4/q5e/0:Y79vhAL8HLBaGAK8
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1860 BSSAClientSetup7.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1944 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2680 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1860 2928 BSSAClientSetup7.exe 86 PID 2928 wrote to memory of 1860 2928 BSSAClientSetup7.exe 86 PID 2928 wrote to memory of 1860 2928 BSSAClientSetup7.exe 86 PID 1860 wrote to memory of 1944 1860 BSSAClientSetup7.tmp 87 PID 1860 wrote to memory of 1944 1860 BSSAClientSetup7.tmp 87 PID 1860 wrote to memory of 1944 1860 BSSAClientSetup7.tmp 87 PID 1860 wrote to memory of 2680 1860 BSSAClientSetup7.tmp 89 PID 1860 wrote to memory of 2680 1860 BSSAClientSetup7.tmp 89 PID 1860 wrote to memory of 2680 1860 BSSAClientSetup7.tmp 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\is-4L7EG.tmp\BSSAClientSetup7.tmp"C:\Users\Admin\AppData\Local\Temp\is-4L7EG.tmp\BSSAClientSetup7.tmp" /SL5="$501CE,14868872,52736,C:\Users\Admin\AppData\Local\Temp\BSSAClientSetup7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" stop NetSpeedGuard3⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /F /IM NetSpeedGuardTip.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640
-
Filesize
700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640