Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/09/2022, 14:55
Static task
static1
General
-
Target
e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe
-
Size
375KB
-
MD5
438d6f0fb55d4d9809d9d21eb3682284
-
SHA1
e7375ef8b8f029e345ab1cbd0d7a9715eefb5a56
-
SHA256
e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac
-
SHA512
7d159e690176250ba06602bf6e4138f4b0380de0795f51864addd656dcbaf0b98b363d8580f5f544de0d690d64c91063ad4c0a00d8f278f8f19c56d079e38d8c
-
SSDEEP
6144:Kv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:K4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2244-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2244-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2244-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2244-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1244-246-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4264-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3044-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4264-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 1244 SQLSerasi.exe 4264 SQLSerasi.exe 3044 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2244-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2244-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2244-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2244-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2244-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1244-246-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4264-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3044-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4264-369-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2244 e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe Token: SeDebugPrivilege 1244 SQLSerasi.exe Token: SeDebugPrivilege 4264 SQLSerasi.exe Token: SeDebugPrivilege 4264 SQLSerasi.exe Token: SeDebugPrivilege 3044 SQLSerasi.exe Token: SeDebugPrivilege 3044 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1244 2244 e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe 67 PID 2244 wrote to memory of 1244 2244 e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe 67 PID 2244 wrote to memory of 1244 2244 e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe 67 PID 4264 wrote to memory of 3044 4264 SQLSerasi.exe 69 PID 4264 wrote to memory of 3044 4264 SQLSerasi.exe 69 PID 4264 wrote to memory of 3044 4264 SQLSerasi.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe"C:\Users\Admin\AppData\Local\Temp\e6385b5852258fc227880a159f40450860c16e550ee81ff745447d24d8c1e5ac.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5ef88986a8c3fc6954894df0828046e88
SHA11085ec4bfc8cbfd5532a76848b265ff3adc3a394
SHA25627538dba250073d08e747d71c00e5271ae8a60493d6961e46828f688dde6ce32
SHA512e93a2e158622dd14e2bd6ecd0e5f7fe13f6e169782338f2f60d47c1410c44710a1d0399c0bee09a9fdab0a0ffaaa3eeb4f7601c6778b4369505432cbd3452248
-
Filesize
39.4MB
MD5ef88986a8c3fc6954894df0828046e88
SHA11085ec4bfc8cbfd5532a76848b265ff3adc3a394
SHA25627538dba250073d08e747d71c00e5271ae8a60493d6961e46828f688dde6ce32
SHA512e93a2e158622dd14e2bd6ecd0e5f7fe13f6e169782338f2f60d47c1410c44710a1d0399c0bee09a9fdab0a0ffaaa3eeb4f7601c6778b4369505432cbd3452248
-
Filesize
39.4MB
MD5ef88986a8c3fc6954894df0828046e88
SHA11085ec4bfc8cbfd5532a76848b265ff3adc3a394
SHA25627538dba250073d08e747d71c00e5271ae8a60493d6961e46828f688dde6ce32
SHA512e93a2e158622dd14e2bd6ecd0e5f7fe13f6e169782338f2f60d47c1410c44710a1d0399c0bee09a9fdab0a0ffaaa3eeb4f7601c6778b4369505432cbd3452248
-
Filesize
39.4MB
MD5ef88986a8c3fc6954894df0828046e88
SHA11085ec4bfc8cbfd5532a76848b265ff3adc3a394
SHA25627538dba250073d08e747d71c00e5271ae8a60493d6961e46828f688dde6ce32
SHA512e93a2e158622dd14e2bd6ecd0e5f7fe13f6e169782338f2f60d47c1410c44710a1d0399c0bee09a9fdab0a0ffaaa3eeb4f7601c6778b4369505432cbd3452248