Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 20:19
Static task
static1
General
-
Target
759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe
-
Size
375KB
-
MD5
29aa8a4d1d634461eb3ebf3227194c87
-
SHA1
4561d01e687a84e5cdb2e85cc5ff6e2bbd686c20
-
SHA256
759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b
-
SHA512
689628b09de3522b61bb7295fd30ad31748c96f3b0d5d7f20960bf54f9e09fb2466306472495c77fd5a81d05c04493203208e5b2bf1e539822dcf5a55714e5f9
-
SSDEEP
6144:1v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:14VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2584-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2584-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2584-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/380-245-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3360-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4260-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3360-386-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4260-388-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 380 SQLSerasi.exe 3360 SQLSerasi.exe 4260 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2584-168-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2584-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2584-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2584-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/380-245-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3360-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4260-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3360-386-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4260-388-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: SQLSerasi.exe File opened (read-only) \??\J: SQLSerasi.exe File opened (read-only) \??\K: SQLSerasi.exe File opened (read-only) \??\O: SQLSerasi.exe File opened (read-only) \??\P: SQLSerasi.exe File opened (read-only) \??\R: SQLSerasi.exe File opened (read-only) \??\V: SQLSerasi.exe File opened (read-only) \??\B: SQLSerasi.exe File opened (read-only) \??\Y: SQLSerasi.exe File opened (read-only) \??\X: SQLSerasi.exe File opened (read-only) \??\M: SQLSerasi.exe File opened (read-only) \??\N: SQLSerasi.exe File opened (read-only) \??\T: SQLSerasi.exe File opened (read-only) \??\H: SQLSerasi.exe File opened (read-only) \??\U: SQLSerasi.exe File opened (read-only) \??\Z: SQLSerasi.exe File opened (read-only) \??\Q: SQLSerasi.exe File opened (read-only) \??\G: SQLSerasi.exe File opened (read-only) \??\I: SQLSerasi.exe File opened (read-only) \??\L: SQLSerasi.exe File opened (read-only) \??\S: SQLSerasi.exe File opened (read-only) \??\W: SQLSerasi.exe File opened (read-only) \??\F: SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SQLSerasi.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software SQLSerasi.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4260 SQLSerasi.exe 4260 SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2584 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe Token: SeDebugPrivilege 380 SQLSerasi.exe Token: SeDebugPrivilege 3360 SQLSerasi.exe Token: SeDebugPrivilege 3360 SQLSerasi.exe Token: SeDebugPrivilege 4260 SQLSerasi.exe Token: SeDebugPrivilege 4260 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2584 wrote to memory of 380 2584 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe 66 PID 2584 wrote to memory of 380 2584 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe 66 PID 2584 wrote to memory of 380 2584 759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe 66 PID 3360 wrote to memory of 4260 3360 SQLSerasi.exe 68 PID 3360 wrote to memory of 4260 3360 SQLSerasi.exe 68 PID 3360 wrote to memory of 4260 3360 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe"C:\Users\Admin\AppData\Local\Temp\759859709a2b91ee500201d9616f3a5d38c9c0e4313aa81c18ed125225a5540b.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5325d7e5e8e2500b60bacfe7ee5c4a837
SHA1223ea5a03c2c9c48dafffdd1a53ee553e6a38ce6
SHA256e94bfd692c5e0910fb3dc0ac5397c7871571ac22197be2fc25426e70e93d4eea
SHA512ffe38e0af28aef436d9cace1398d034fc4030541a63e21b8fa258a61eb321f2969163abb44cb1b5ab2a0949c2f7c0bb8d0ec1fbdc71dc4bea7493d34f479ce74
-
Filesize
39.4MB
MD5325d7e5e8e2500b60bacfe7ee5c4a837
SHA1223ea5a03c2c9c48dafffdd1a53ee553e6a38ce6
SHA256e94bfd692c5e0910fb3dc0ac5397c7871571ac22197be2fc25426e70e93d4eea
SHA512ffe38e0af28aef436d9cace1398d034fc4030541a63e21b8fa258a61eb321f2969163abb44cb1b5ab2a0949c2f7c0bb8d0ec1fbdc71dc4bea7493d34f479ce74
-
Filesize
39.4MB
MD5325d7e5e8e2500b60bacfe7ee5c4a837
SHA1223ea5a03c2c9c48dafffdd1a53ee553e6a38ce6
SHA256e94bfd692c5e0910fb3dc0ac5397c7871571ac22197be2fc25426e70e93d4eea
SHA512ffe38e0af28aef436d9cace1398d034fc4030541a63e21b8fa258a61eb321f2969163abb44cb1b5ab2a0949c2f7c0bb8d0ec1fbdc71dc4bea7493d34f479ce74
-
Filesize
39.4MB
MD5325d7e5e8e2500b60bacfe7ee5c4a837
SHA1223ea5a03c2c9c48dafffdd1a53ee553e6a38ce6
SHA256e94bfd692c5e0910fb3dc0ac5397c7871571ac22197be2fc25426e70e93d4eea
SHA512ffe38e0af28aef436d9cace1398d034fc4030541a63e21b8fa258a61eb321f2969163abb44cb1b5ab2a0949c2f7c0bb8d0ec1fbdc71dc4bea7493d34f479ce74