Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe
Resource
win7-20220901-en
General
-
Target
7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe
-
Size
375KB
-
MD5
19f69ecc4eb89717486d9c1402aa5bdc
-
SHA1
72c1725abe5552bdcfa098d161610dcd70de0f46
-
SHA256
7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e
-
SHA512
baedbafb735ed61b0997a045248bafce341fa59182984c7b49810af67ad6ed5b24b13ed79bedb17b2a8ed6e9c08721bd84624a3e9e6594acd32fb661da090d66
-
SSDEEP
6144:9v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:94VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral2/memory/372-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/372-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/372-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/3032-150-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/4600-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/4600-156-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/4600-159-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/1164-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 3032 SQLSerasi.exe 4600 SQLSerasi.exe 1164 SQLSerasi.exe 3588 SQLSerasi.exe -
resource yara_rule behavioral2/memory/372-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/372-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/372-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/372-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/3032-150-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/4600-152-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/4600-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/4600-156-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/4600-159-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/1164-177-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3092 4600 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 372 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe Token: SeDebugPrivilege 3032 SQLSerasi.exe Token: SeDebugPrivilege 4600 SQLSerasi.exe Token: SeDebugPrivilege 4600 SQLSerasi.exe Token: SeDebugPrivilege 4600 SQLSerasi.exe Token: SeDebugPrivilege 1164 SQLSerasi.exe Token: SeDebugPrivilege 3588 SQLSerasi.exe Token: SeDebugPrivilege 1164 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 372 wrote to memory of 3032 372 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe 82 PID 372 wrote to memory of 3032 372 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe 82 PID 372 wrote to memory of 3032 372 7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe 82 PID 4600 wrote to memory of 1164 4600 SQLSerasi.exe 84 PID 4600 wrote to memory of 1164 4600 SQLSerasi.exe 84 PID 4600 wrote to memory of 1164 4600 SQLSerasi.exe 84 PID 4600 wrote to memory of 3588 4600 SQLSerasi.exe 85 PID 4600 wrote to memory of 3588 4600 SQLSerasi.exe 85 PID 4600 wrote to memory of 3588 4600 SQLSerasi.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe"C:\Users\Admin\AppData\Local\Temp\7a147185df41e77b465e8dba98410ef138dd4a563c14c258eabc74c59197a08e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 5762⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4600 -ip 46001⤵PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5ad3b7308f91f9481f682f89c26d725be
SHA10c88ae5f8b3217e0c3578a45f02005b386b51f4d
SHA256ad718edc9e1c10c7ecb892d1443832f807163ac13a6fa1193b82eb1abd6b1a4b
SHA512f21020084d9eae6fb38def7d10e0e3e9ce6ae0fdb8e6dbc1ffb148c0421b6ed5452587341cfc2c14d9e6401559e80b8794b448eae7eb42cef02b148d4d9c66b5
-
Filesize
39.4MB
MD5ad3b7308f91f9481f682f89c26d725be
SHA10c88ae5f8b3217e0c3578a45f02005b386b51f4d
SHA256ad718edc9e1c10c7ecb892d1443832f807163ac13a6fa1193b82eb1abd6b1a4b
SHA512f21020084d9eae6fb38def7d10e0e3e9ce6ae0fdb8e6dbc1ffb148c0421b6ed5452587341cfc2c14d9e6401559e80b8794b448eae7eb42cef02b148d4d9c66b5
-
Filesize
39.4MB
MD5ad3b7308f91f9481f682f89c26d725be
SHA10c88ae5f8b3217e0c3578a45f02005b386b51f4d
SHA256ad718edc9e1c10c7ecb892d1443832f807163ac13a6fa1193b82eb1abd6b1a4b
SHA512f21020084d9eae6fb38def7d10e0e3e9ce6ae0fdb8e6dbc1ffb148c0421b6ed5452587341cfc2c14d9e6401559e80b8794b448eae7eb42cef02b148d4d9c66b5
-
Filesize
39.4MB
MD5ad3b7308f91f9481f682f89c26d725be
SHA10c88ae5f8b3217e0c3578a45f02005b386b51f4d
SHA256ad718edc9e1c10c7ecb892d1443832f807163ac13a6fa1193b82eb1abd6b1a4b
SHA512f21020084d9eae6fb38def7d10e0e3e9ce6ae0fdb8e6dbc1ffb148c0421b6ed5452587341cfc2c14d9e6401559e80b8794b448eae7eb42cef02b148d4d9c66b5
-
Filesize
39.4MB
MD5ad3b7308f91f9481f682f89c26d725be
SHA10c88ae5f8b3217e0c3578a45f02005b386b51f4d
SHA256ad718edc9e1c10c7ecb892d1443832f807163ac13a6fa1193b82eb1abd6b1a4b
SHA512f21020084d9eae6fb38def7d10e0e3e9ce6ae0fdb8e6dbc1ffb148c0421b6ed5452587341cfc2c14d9e6401559e80b8794b448eae7eb42cef02b148d4d9c66b5