Analysis
-
max time kernel
130s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2022, 23:14
Static task
static1
General
-
Target
8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe
-
Size
375KB
-
MD5
e79da00e5a155a737914cad3c45e443a
-
SHA1
a058698462f78128558de8f58bc3a14495142535
-
SHA256
8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf
-
SHA512
39f629929206bbebe0ccd2fcf905d1a944e9b7791010e36ab1022bf79090b934c8eb24aa6e22685b40d22b87eb4e72606f3f08c216f36ef35d4f62afa26fc6ea
-
SSDEEP
6144:5v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:54VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1816-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1816-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1816-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4488-261-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4816-301-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4572-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4816-371-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4572-373-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4488 SQLSerasi.exe 4816 SQLSerasi.exe 4572 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1816-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1816-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1816-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1816-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4488-261-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4816-301-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4572-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4816-371-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4572-373-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1816 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe Token: SeDebugPrivilege 4488 SQLSerasi.exe Token: SeDebugPrivilege 4816 SQLSerasi.exe Token: SeDebugPrivilege 4816 SQLSerasi.exe Token: SeDebugPrivilege 4572 SQLSerasi.exe Token: SeDebugPrivilege 4572 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4488 1816 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe 66 PID 1816 wrote to memory of 4488 1816 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe 66 PID 1816 wrote to memory of 4488 1816 8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe 66 PID 4816 wrote to memory of 4572 4816 SQLSerasi.exe 68 PID 4816 wrote to memory of 4572 4816 SQLSerasi.exe 68 PID 4816 wrote to memory of 4572 4816 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe"C:\Users\Admin\AppData\Local\Temp\8ac26cd81ecbf2de9b41dd3f1ce37bc34b02ab8e9ed38b4f94dd3563cebc97cf.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD56927fb320127f44943634493ad71e1c4
SHA17eefd48c095a944f20299c963ff28a7d0f0522be
SHA256ca382c3ac1b29a056cbc43d2d5ed5e1dd68dd7a89bdf797912342430c18dde49
SHA512c2e5f4457e807385bbc4a5aec78b7b055ff59d3ec25152c4ba434b07fae6e7f4dcf06414b7ebb81080227788cc1db2e6c54780ee5090d82b3a30e03232ae5db0
-
Filesize
39.4MB
MD56927fb320127f44943634493ad71e1c4
SHA17eefd48c095a944f20299c963ff28a7d0f0522be
SHA256ca382c3ac1b29a056cbc43d2d5ed5e1dd68dd7a89bdf797912342430c18dde49
SHA512c2e5f4457e807385bbc4a5aec78b7b055ff59d3ec25152c4ba434b07fae6e7f4dcf06414b7ebb81080227788cc1db2e6c54780ee5090d82b3a30e03232ae5db0
-
Filesize
39.4MB
MD56927fb320127f44943634493ad71e1c4
SHA17eefd48c095a944f20299c963ff28a7d0f0522be
SHA256ca382c3ac1b29a056cbc43d2d5ed5e1dd68dd7a89bdf797912342430c18dde49
SHA512c2e5f4457e807385bbc4a5aec78b7b055ff59d3ec25152c4ba434b07fae6e7f4dcf06414b7ebb81080227788cc1db2e6c54780ee5090d82b3a30e03232ae5db0
-
Filesize
39.4MB
MD56927fb320127f44943634493ad71e1c4
SHA17eefd48c095a944f20299c963ff28a7d0f0522be
SHA256ca382c3ac1b29a056cbc43d2d5ed5e1dd68dd7a89bdf797912342430c18dde49
SHA512c2e5f4457e807385bbc4a5aec78b7b055ff59d3ec25152c4ba434b07fae6e7f4dcf06414b7ebb81080227788cc1db2e6c54780ee5090d82b3a30e03232ae5db0