Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2022, 22:27
Static task
static1
General
-
Target
9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe
-
Size
375KB
-
MD5
c8318617303ecb0f9b5e53f5fcf1666a
-
SHA1
07267e0e3f9151fc6136da1c754c2998b12c45be
-
SHA256
9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249
-
SHA512
29da4cb2b38c44a5516cffcc25063fde50005997599df267cded23e5ecc60cc71ef28085cd73ddfc640a639af098a90393f2db95b380d7f50ea3f58fb2567a62
-
SSDEEP
6144:Uv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:U4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2732-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2732-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2732-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2732-179-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3124-248-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4984-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4956-360-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4984-372-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4956-374-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3124 SQLSerasi.exe 4984 SQLSerasi.exe 4956 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2732-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2732-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2732-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2732-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2732-179-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3124-248-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4984-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4956-360-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4984-372-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4956-374-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2732 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe Token: SeDebugPrivilege 3124 SQLSerasi.exe Token: SeDebugPrivilege 4984 SQLSerasi.exe Token: SeDebugPrivilege 4984 SQLSerasi.exe Token: SeDebugPrivilege 4956 SQLSerasi.exe Token: SeDebugPrivilege 4956 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3124 2732 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe 66 PID 2732 wrote to memory of 3124 2732 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe 66 PID 2732 wrote to memory of 3124 2732 9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe 66 PID 4984 wrote to memory of 4956 4984 SQLSerasi.exe 68 PID 4984 wrote to memory of 4956 4984 SQLSerasi.exe 68 PID 4984 wrote to memory of 4956 4984 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe"C:\Users\Admin\AppData\Local\Temp\9ceb679f29ec6de32fcccfa8029625fd9718f0465c43e683bd288438e3d11249.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5cfaa65ac025a9f02099ebe3681e08537
SHA1555bf67f059a88fda8705a0bd6c720ea2fed9d5a
SHA2565302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675
SHA512d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda
-
Filesize
39.4MB
MD5cfaa65ac025a9f02099ebe3681e08537
SHA1555bf67f059a88fda8705a0bd6c720ea2fed9d5a
SHA2565302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675
SHA512d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda
-
Filesize
39.4MB
MD5cfaa65ac025a9f02099ebe3681e08537
SHA1555bf67f059a88fda8705a0bd6c720ea2fed9d5a
SHA2565302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675
SHA512d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda
-
Filesize
39.4MB
MD5cfaa65ac025a9f02099ebe3681e08537
SHA1555bf67f059a88fda8705a0bd6c720ea2fed9d5a
SHA2565302aef2f80be70ef3ae9fe7ddd8ab47fb2b3c0da47e71852956d8a81122f675
SHA512d5fa40e163f8c0af8cfaccfa73c08eca05054ed472a7fdefb62b46f07174bbc4c6cbebe97c54c9e416bed9f04ae79728c57ad9adb851cb8ab51d1110b413fdda