Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
26/09/2022, 06:45
Static task
static1
General
-
Target
b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe
-
Size
375KB
-
MD5
e0b9db22bc5de042ce7cb2ad56a8aef4
-
SHA1
39f915d9cc43b7f162b221c8757be55e5f44bb0e
-
SHA256
b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21
-
SHA512
1bd085f5f289ff3feea6eb5730aceead00ac160a2f5e3f9a052f79f32d39c639cae4e657a721b6c7c18d6c306a018783819c2817b0651f2f08681ef64be292b3
-
SSDEEP
6144:5v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:54VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1524-169-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3348-278-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4196-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4124-358-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4196-368-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3348 SQLSerasi.exe 4196 SQLSerasi.exe 4124 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1524-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-169-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3348-278-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4196-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4124-358-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4196-368-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1524 b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe Token: SeDebugPrivilege 3348 SQLSerasi.exe Token: SeDebugPrivilege 4196 SQLSerasi.exe Token: SeDebugPrivilege 4196 SQLSerasi.exe Token: SeDebugPrivilege 4124 SQLSerasi.exe Token: SeDebugPrivilege 4124 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3348 1524 b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe 66 PID 1524 wrote to memory of 3348 1524 b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe 66 PID 1524 wrote to memory of 3348 1524 b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe 66 PID 4196 wrote to memory of 4124 4196 SQLSerasi.exe 68 PID 4196 wrote to memory of 4124 4196 SQLSerasi.exe 68 PID 4196 wrote to memory of 4124 4196 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe"C:\Users\Admin\AppData\Local\Temp\b0d8c5c6fde25a820d1322325049b004fbbd214d03ac76707f6ee681cdfbaa21.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5e19158db013bbd705b2607ba72696419
SHA103241ec76f505a87ed51b59c669befa231544c6c
SHA2569f7bc2faf33af6bd2fdf9c173a020dac31838adaa00762ac093dab5559a21164
SHA5120f969c87d608b5babd64c5da61f78aa9ce553f848aff1589a29cc5fb12447002c7ca9aba2a78a3966926ea7d1c7052c4ff088553fe96be4a777c2c39fc687f62
-
Filesize
39.4MB
MD5e19158db013bbd705b2607ba72696419
SHA103241ec76f505a87ed51b59c669befa231544c6c
SHA2569f7bc2faf33af6bd2fdf9c173a020dac31838adaa00762ac093dab5559a21164
SHA5120f969c87d608b5babd64c5da61f78aa9ce553f848aff1589a29cc5fb12447002c7ca9aba2a78a3966926ea7d1c7052c4ff088553fe96be4a777c2c39fc687f62
-
Filesize
39.4MB
MD5e19158db013bbd705b2607ba72696419
SHA103241ec76f505a87ed51b59c669befa231544c6c
SHA2569f7bc2faf33af6bd2fdf9c173a020dac31838adaa00762ac093dab5559a21164
SHA5120f969c87d608b5babd64c5da61f78aa9ce553f848aff1589a29cc5fb12447002c7ca9aba2a78a3966926ea7d1c7052c4ff088553fe96be4a777c2c39fc687f62
-
Filesize
39.4MB
MD5e19158db013bbd705b2607ba72696419
SHA103241ec76f505a87ed51b59c669befa231544c6c
SHA2569f7bc2faf33af6bd2fdf9c173a020dac31838adaa00762ac093dab5559a21164
SHA5120f969c87d608b5babd64c5da61f78aa9ce553f848aff1589a29cc5fb12447002c7ca9aba2a78a3966926ea7d1c7052c4ff088553fe96be4a777c2c39fc687f62