Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
167s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2022, 03:07 UTC
Static task
static1
General
-
Target
b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe
-
Size
375KB
-
MD5
f6253a3088d99bc7555336d9fd9d3b4a
-
SHA1
c67afbf58345161f022cf1ea11b68419c3586fa3
-
SHA256
b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd
-
SHA512
06a70a42e22f8b7cab28b9da873679dc29dcc8160b0d494d4b84c725f9346bfcbf38b720f0a1765be433dd7011cd86dd3bf3b5c813f3fd6fc676eac38bbe8415
-
SSDEEP
6144:ov5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:o4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/1744-169-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1744-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1744-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1744-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3664-245-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4644-305-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/584-365-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3664 SQLSerasi.exe 4644 SQLSerasi.exe 584 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1744-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1744-169-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1744-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1744-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1744-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3664-245-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4644-305-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/584-365-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1744 b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe Token: SeDebugPrivilege 3664 SQLSerasi.exe Token: SeDebugPrivilege 4644 SQLSerasi.exe Token: SeDebugPrivilege 4644 SQLSerasi.exe Token: SeDebugPrivilege 584 SQLSerasi.exe Token: SeDebugPrivilege 584 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3664 1744 b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe 66 PID 1744 wrote to memory of 3664 1744 b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe 66 PID 1744 wrote to memory of 3664 1744 b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe 66 PID 4644 wrote to memory of 584 4644 SQLSerasi.exe 68 PID 4644 wrote to memory of 584 4644 SQLSerasi.exe 68 PID 4644 wrote to memory of 584 4644 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe"C:\Users\Admin\AppData\Local\Temp\b46a11998123c005e146c4baae1209d184626af3457ca8e26df2745c2d4963dd.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:584
-
Network
-
Remote address:8.8.8.8:53Requestd.nxxxn.gaIN AResponsed.nxxxn.gaIN A91.208.245.48
-
Remote address:8.8.8.8:53Requestr.pengyou.comIN AResponser.pengyou.comIN A0.0.0.1
-
322 B 7
-
156 B 3
-
322 B 7
-
156 B 3
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD566e3df96766a263d249de25980c81e16
SHA19be1139024b27f552ab44a29dfe117ef140a8edf
SHA2561e4d307be993d15c3fb12e778cfd010ccecc15cba0fbb557b935e32b697ce4e2
SHA512b97dea0c0c449acac20887b7d5cfb71a1b91f2a00380ab24a7718b8418190659c3ae3ed7fb45bed5295f0f841faf76e62784d67d1a53d7450def784ce1a312c2
-
Filesize
39.4MB
MD566e3df96766a263d249de25980c81e16
SHA19be1139024b27f552ab44a29dfe117ef140a8edf
SHA2561e4d307be993d15c3fb12e778cfd010ccecc15cba0fbb557b935e32b697ce4e2
SHA512b97dea0c0c449acac20887b7d5cfb71a1b91f2a00380ab24a7718b8418190659c3ae3ed7fb45bed5295f0f841faf76e62784d67d1a53d7450def784ce1a312c2
-
Filesize
39.4MB
MD566e3df96766a263d249de25980c81e16
SHA19be1139024b27f552ab44a29dfe117ef140a8edf
SHA2561e4d307be993d15c3fb12e778cfd010ccecc15cba0fbb557b935e32b697ce4e2
SHA512b97dea0c0c449acac20887b7d5cfb71a1b91f2a00380ab24a7718b8418190659c3ae3ed7fb45bed5295f0f841faf76e62784d67d1a53d7450def784ce1a312c2
-
Filesize
39.4MB
MD566e3df96766a263d249de25980c81e16
SHA19be1139024b27f552ab44a29dfe117ef140a8edf
SHA2561e4d307be993d15c3fb12e778cfd010ccecc15cba0fbb557b935e32b697ce4e2
SHA512b97dea0c0c449acac20887b7d5cfb71a1b91f2a00380ab24a7718b8418190659c3ae3ed7fb45bed5295f0f841faf76e62784d67d1a53d7450def784ce1a312c2