Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
505s -
max time network
492s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
MSERT.exe
Resource
win10v2004-20230703-en
General
-
Target
MSERT.exe
-
Size
118.3MB
-
MD5
cc57cc818bc6a84a4f300db18ecc8940
-
SHA1
bb16709683f66391d1b4ff9a41d2dcec1acc5d1f
-
SHA256
9cb1855d5bb17735a712ef1131ce61448089d4a9968d7a4281e2e1edcd498ec1
-
SHA512
30ecca214a8979ad48e29988dc778e785a0e2d18db433d4a3be13619662c0e97c0be22efeb7657048008df980c99c10fc2cecdc00a9c6b99153b0a9d935ca61a
-
SSDEEP
3145728:J1Q3AZ+3ECO/N9NBpYw/Ffr1BEU00YG/uvjv9IVM/crx1B:J1y3ECqNlCw/FfnEUkG/UsjB
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3276 MSERT.exe 3276 MSERT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32 MSERT.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: MSERT.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt MSERT.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\msert.log MSERT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32 MSERT.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe 3276 MSERT.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3276 MSERT.exe Token: SeBackupPrivilege 3276 MSERT.exe Token: SeRestorePrivilege 3276 MSERT.exe Token: SeSystemEnvironmentPrivilege 3276 MSERT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSERT.exe"C:\Users\Admin\AppData\Local\Temp\MSERT.exe"1⤵
- Loads dropped DLL
- Registers COM server for autorun
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD56e434174fef49a6ed6ab1ba8d1c37285
SHA19f5a8ed87b9e500c028f943f7bb473a25fee86ba
SHA256f4ca5bae87e303a5ea6ce3a73cadc57317be53cb9ba2ed2565f2bb092650d7f8
SHA512d8fa5f154af07ccf24ad08829d7ec23e444ad5a3041fe7cf435f1ddb593872984c9d73d8a5f307e70299d842a6898eca31f825828945b490e0a4ec16ce775695
-
Filesize
17.2MB
MD5ca429f544c226150b7472deca88398de
SHA18202f1b5cdd4c3200542578587e423cb15274e71
SHA2565e09cde6608fd1b899c749346a2894bda95cfa3c5f0781962c2db762d2660a28
SHA512118fb3b321d3fc4b7cf428c020f8f01253ae13a1ed1826571e7aa5cb6dde2174624b0239eaf0098c097bbb3772b70e1d4e796374ee98a508768cc4d18cf971e9
-
Filesize
17.2MB
MD5ca429f544c226150b7472deca88398de
SHA18202f1b5cdd4c3200542578587e423cb15274e71
SHA2565e09cde6608fd1b899c749346a2894bda95cfa3c5f0781962c2db762d2660a28
SHA512118fb3b321d3fc4b7cf428c020f8f01253ae13a1ed1826571e7aa5cb6dde2174624b0239eaf0098c097bbb3772b70e1d4e796374ee98a508768cc4d18cf971e9
-
Filesize
607KB
MD5a0c4ac6378ce0313955dccfd2d9208a6
SHA17ee2f0f3bf4504f4f7bbc63cb5fa883711c13801
SHA256abbe3285c58c830314f9f0ad2ddc769139c0d808e27893290adc69a535b996b1
SHA51272ea9f0d7399fa5d6865f3f887ffa07098b883b1428b33dcb552a40bb22ca6a461a546736667ca1aa97e5f06dffd10dab765c7f6e3e827dd0335b562b27d2fb5