Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2022, 14:44
Static task
static1
General
-
Target
b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe
-
Size
375KB
-
MD5
ab90afe5b00f1e64bfa6f472e18bf9ab
-
SHA1
1933cc780a636c411f16b012b1c3f08b0e0e4331
-
SHA256
b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38
-
SHA512
4d61d982264fca02f508f20cdbb70944d666fee47764c753500c9b00961689fc707ecaad4a957af893129df6dd992a643b6bf769c1c4480935d8c7e192faa1c5
-
SSDEEP
6144:Dv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:D4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/2484-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2484-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2484-179-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1040-276-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3404-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4516-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4516-372-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 1040 SQLSerasi.exe 3404 SQLSerasi.exe 4516 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2484-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2484-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2484-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2484-179-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1040-276-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3404-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4516-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4516-372-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2484 b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe Token: SeDebugPrivilege 1040 SQLSerasi.exe Token: SeDebugPrivilege 3404 SQLSerasi.exe Token: SeDebugPrivilege 3404 SQLSerasi.exe Token: SeDebugPrivilege 4516 SQLSerasi.exe Token: SeDebugPrivilege 4516 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1040 2484 b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe 66 PID 2484 wrote to memory of 1040 2484 b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe 66 PID 2484 wrote to memory of 1040 2484 b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe 66 PID 3404 wrote to memory of 4516 3404 SQLSerasi.exe 68 PID 3404 wrote to memory of 4516 3404 SQLSerasi.exe 68 PID 3404 wrote to memory of 4516 3404 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe"C:\Users\Admin\AppData\Local\Temp\b03ce97b258ee3ebae207c954628c11734ab5f515a1ffce3513a548e31739d38.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD563ab504977049e8a55d54c097fd0b01c
SHA10f6a3cb894157deddc682f0d0f2255b6d729fac7
SHA256f756b5aca85652321d2f4b7f62902741ea005de49e6c26320d374ab15cee6af3
SHA51212f91ad169ffba9c466c0ec53f815ce138b98838d3168e8a8d0e24437e55c62e43ac847981a2949f521693a8e83a6a4a48f95e0954a0609c5c4049f919fb6b88
-
Filesize
39.4MB
MD563ab504977049e8a55d54c097fd0b01c
SHA10f6a3cb894157deddc682f0d0f2255b6d729fac7
SHA256f756b5aca85652321d2f4b7f62902741ea005de49e6c26320d374ab15cee6af3
SHA51212f91ad169ffba9c466c0ec53f815ce138b98838d3168e8a8d0e24437e55c62e43ac847981a2949f521693a8e83a6a4a48f95e0954a0609c5c4049f919fb6b88
-
Filesize
39.4MB
MD563ab504977049e8a55d54c097fd0b01c
SHA10f6a3cb894157deddc682f0d0f2255b6d729fac7
SHA256f756b5aca85652321d2f4b7f62902741ea005de49e6c26320d374ab15cee6af3
SHA51212f91ad169ffba9c466c0ec53f815ce138b98838d3168e8a8d0e24437e55c62e43ac847981a2949f521693a8e83a6a4a48f95e0954a0609c5c4049f919fb6b88
-
Filesize
39.4MB
MD563ab504977049e8a55d54c097fd0b01c
SHA10f6a3cb894157deddc682f0d0f2255b6d729fac7
SHA256f756b5aca85652321d2f4b7f62902741ea005de49e6c26320d374ab15cee6af3
SHA51212f91ad169ffba9c466c0ec53f815ce138b98838d3168e8a8d0e24437e55c62e43ac847981a2949f521693a8e83a6a4a48f95e0954a0609c5c4049f919fb6b88