Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/10/2022, 22:27

General

  • Target

    9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe

  • Size

    375KB

  • MD5

    c8318617303ecb0f9b5e53f5fcf1666a

  • SHA1

    07267e0e3f9151fc6136da1c754c2998b12c45be

  • SHA256

    9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249

  • SHA512

    29da4cb2b38c44a5516cffcc25063fde50005997599df267cded23e5ecc60cc71ef28085cd73ddfc640a639af098a90393f2db95b380d7f50ea3f58fb2567a62

  • SSDEEP

    6144:Uv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:U4VOiF1WD7kE1dTYOi8V5u23zmWFy4

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 9 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe
    "C:\Users\Admin\AppData\Local\Temp\9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3124
  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
    "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    cfaa65ac025a9f02099ebe3681e08537

    SHA1

    555bf67f059a88fda8705a0bd6c720ea2fed9d5a

    SHA256

    5302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675

    SHA512

    d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    cfaa65ac025a9f02099ebe3681e08537

    SHA1

    555bf67f059a88fda8705a0bd6c720ea2fed9d5a

    SHA256

    5302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675

    SHA512

    d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    cfaa65ac025a9f02099ebe3681e08537

    SHA1

    555bf67f059a88fda8705a0bd6c720ea2fed9d5a

    SHA256

    5302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675

    SHA512

    d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    cfaa65ac025a9f02099ebe3681e08537

    SHA1

    555bf67f059a88fda8705a0bd6c720ea2fed9d5a

    SHA256

    5302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675

    SHA512

    d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda

  • memory/2732-157-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-168-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-124-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2732-123-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-125-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-126-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-127-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-128-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-129-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-130-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-131-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-132-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-121-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-135-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-134-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-136-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-138-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-137-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-139-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-140-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-141-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-143-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-142-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-145-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-146-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-147-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-144-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-148-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-149-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-150-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-151-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-152-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-153-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-154-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-155-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-156-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-133-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-122-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-173-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-160-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-161-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-162-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-163-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-164-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-165-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-166-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-167-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-158-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-169-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-170-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2732-174-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2732-175-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2732-159-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-176-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2732-177-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-178-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-179-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2732-180-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-181-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-182-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-183-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-184-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-185-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-186-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/2732-192-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2732-120-0x0000000076F80000-0x000000007710E000-memory.dmp

    Filesize

    1.6MB

  • memory/3124-248-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/3124-303-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4956-360-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4956-373-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4956-374-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4984-302-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4984-371-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/4984-372-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB