Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2022, 20:15
Static task
static1
General
-
Target
81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe
-
Size
375KB
-
MD5
0fcb53897801a8a51fc3e14c70c7ec8e
-
SHA1
62b750e2989489abc2ab11778587803a54e7dc2f
-
SHA256
81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94
-
SHA512
0a0f92234f69dcf55f598e17991851b146fe8f0dad8bfe66ec10afbc7000e8a8ec1a5c8fe1a0e7b93d493ecfb770ac79cad5b97d4fba90c0cf2cbea3f7dae159
-
SSDEEP
6144:Iv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:I4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2248-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2248-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2248-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4160-243-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4160-273-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4228-300-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3132-358-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4228-370-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3132-372-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4160 SQLSerasi.exe 4228 SQLSerasi.exe 3132 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2248-168-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2248-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2248-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2248-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4160-243-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4160-273-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4228-300-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3132-358-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4228-370-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3132-372-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2248 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe Token: SeDebugPrivilege 4160 SQLSerasi.exe Token: SeDebugPrivilege 4228 SQLSerasi.exe Token: SeDebugPrivilege 4228 SQLSerasi.exe Token: SeDebugPrivilege 3132 SQLSerasi.exe Token: SeDebugPrivilege 3132 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4160 2248 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe 66 PID 2248 wrote to memory of 4160 2248 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe 66 PID 2248 wrote to memory of 4160 2248 81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe 66 PID 4228 wrote to memory of 3132 4228 SQLSerasi.exe 68 PID 4228 wrote to memory of 3132 4228 SQLSerasi.exe 68 PID 4228 wrote to memory of 3132 4228 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe"C:\Users\Admin\AppData\Local\Temp\81912a41074f384b52c2f10f692414fc7ba2c6aa3806cef860b839e92967ba94.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD56b6cd44dc178561d65e15fde384d4e09
SHA1987bb2ba9a58dbb466bb0c91c179174c48a4c480
SHA25693024228d60b35c778b167c4d4d2e550c74ceb62cf64a7376bb3d70fd237a9a8
SHA5129270da96f5c92e716bc5b7732fae9fff64905592bd21ce5eca371c40ffecefce53dc7ed5729d609ccd9c1a1bb5dc451eca8997555131a2a221d78af17abea37d
-
Filesize
39.4MB
MD56b6cd44dc178561d65e15fde384d4e09
SHA1987bb2ba9a58dbb466bb0c91c179174c48a4c480
SHA25693024228d60b35c778b167c4d4d2e550c74ceb62cf64a7376bb3d70fd237a9a8
SHA5129270da96f5c92e716bc5b7732fae9fff64905592bd21ce5eca371c40ffecefce53dc7ed5729d609ccd9c1a1bb5dc451eca8997555131a2a221d78af17abea37d
-
Filesize
39.4MB
MD56b6cd44dc178561d65e15fde384d4e09
SHA1987bb2ba9a58dbb466bb0c91c179174c48a4c480
SHA25693024228d60b35c778b167c4d4d2e550c74ceb62cf64a7376bb3d70fd237a9a8
SHA5129270da96f5c92e716bc5b7732fae9fff64905592bd21ce5eca371c40ffecefce53dc7ed5729d609ccd9c1a1bb5dc451eca8997555131a2a221d78af17abea37d
-
Filesize
39.4MB
MD56b6cd44dc178561d65e15fde384d4e09
SHA1987bb2ba9a58dbb466bb0c91c179174c48a4c480
SHA25693024228d60b35c778b167c4d4d2e550c74ceb62cf64a7376bb3d70fd237a9a8
SHA5129270da96f5c92e716bc5b7732fae9fff64905592bd21ce5eca371c40ffecefce53dc7ed5729d609ccd9c1a1bb5dc451eca8997555131a2a221d78af17abea37d