Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 16:54
Static task
static1
General
-
Target
321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe
-
Size
375KB
-
MD5
61cb06874f73844a4bbdfbc5432a7790
-
SHA1
28756c1251f4e7aadffff469685bb99a732278cf
-
SHA256
321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32
-
SHA512
141b1d1151fecf40a320a1cc3da5dda95e0b8581cfce23dfaee67da051e3a25e72d3442266da42281c00caafe6252a9cebdfc330fc3e36f9ffedf574c1436c58
-
SSDEEP
6144:Tv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:T4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2208-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2208-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2208-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1908-263-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1364-300-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1364-303-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4520-365-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1364-373-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 1908 SQLSerasi.exe 1364 SQLSerasi.exe 4520 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2208-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1908-263-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1364-300-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1364-303-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4520-365-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1364-373-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2208 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe Token: SeDebugPrivilege 1908 SQLSerasi.exe Token: SeDebugPrivilege 1364 SQLSerasi.exe Token: SeDebugPrivilege 1364 SQLSerasi.exe Token: SeDebugPrivilege 4520 SQLSerasi.exe Token: SeDebugPrivilege 4520 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1908 2208 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe 66 PID 2208 wrote to memory of 1908 2208 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe 66 PID 2208 wrote to memory of 1908 2208 321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe 66 PID 1364 wrote to memory of 4520 1364 SQLSerasi.exe 68 PID 1364 wrote to memory of 4520 1364 SQLSerasi.exe 68 PID 1364 wrote to memory of 4520 1364 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe"C:\Users\Admin\AppData\Local\Temp\321cedd7133397d4000231b10167b9eef3b9deb8ac9b3598bd147cd1ec45fe32.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD558998e65fe94c0b9d3774ebb9024f50d
SHA1a82f7f8e2a4fddd18b498d64655cf2cc64689fcc
SHA2569beda8ce5e18053fb671d107525f8a6be08c303189391032a9ba9839ba6c4204
SHA512c7a9e46c54323460bd0af59f830f94f83686cd49cb366bb328ce7af16c2caf439b99f03a06b0ddf6862783d97d90405da02e3e55686ffb7656ee2d555ef91bd5
-
Filesize
39.4MB
MD558998e65fe94c0b9d3774ebb9024f50d
SHA1a82f7f8e2a4fddd18b498d64655cf2cc64689fcc
SHA2569beda8ce5e18053fb671d107525f8a6be08c303189391032a9ba9839ba6c4204
SHA512c7a9e46c54323460bd0af59f830f94f83686cd49cb366bb328ce7af16c2caf439b99f03a06b0ddf6862783d97d90405da02e3e55686ffb7656ee2d555ef91bd5
-
Filesize
39.4MB
MD558998e65fe94c0b9d3774ebb9024f50d
SHA1a82f7f8e2a4fddd18b498d64655cf2cc64689fcc
SHA2569beda8ce5e18053fb671d107525f8a6be08c303189391032a9ba9839ba6c4204
SHA512c7a9e46c54323460bd0af59f830f94f83686cd49cb366bb328ce7af16c2caf439b99f03a06b0ddf6862783d97d90405da02e3e55686ffb7656ee2d555ef91bd5
-
Filesize
39.4MB
MD558998e65fe94c0b9d3774ebb9024f50d
SHA1a82f7f8e2a4fddd18b498d64655cf2cc64689fcc
SHA2569beda8ce5e18053fb671d107525f8a6be08c303189391032a9ba9839ba6c4204
SHA512c7a9e46c54323460bd0af59f830f94f83686cd49cb366bb328ce7af16c2caf439b99f03a06b0ddf6862783d97d90405da02e3e55686ffb7656ee2d555ef91bd5