Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07-09-2022 00:04
Static task
static1
General
-
Target
559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe
-
Size
375KB
-
MD5
b61dd4de0fec0b8792dbdede2536220c
-
SHA1
0f50db1e74c7bd1f1d38373241ed75b396e2f38f
-
SHA256
559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251
-
SHA512
082b63701f1a45529353f91f0453396cd6fc78ee8d5fa2c6f7007dadfc29cbc68a2e68599445ab44fbe0a3bda50cbec0db0d0aff3f11aa16b112d963760516f4
-
SSDEEP
6144:Kv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:K4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/1324-169-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1324-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1324-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1324-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4912-280-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4076-298-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4712-356-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4076-367-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4712-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4912 SQLSerasi.exe 4076 SQLSerasi.exe 4712 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1324-165-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1324-169-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1324-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1324-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1324-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4912-280-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4076-298-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4712-356-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4076-367-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4712-369-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1324 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe Token: SeDebugPrivilege 4912 SQLSerasi.exe Token: SeDebugPrivilege 4076 SQLSerasi.exe Token: SeDebugPrivilege 4076 SQLSerasi.exe Token: SeDebugPrivilege 4712 SQLSerasi.exe Token: SeDebugPrivilege 4712 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4912 1324 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe 66 PID 1324 wrote to memory of 4912 1324 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe 66 PID 1324 wrote to memory of 4912 1324 559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe 66 PID 4076 wrote to memory of 4712 4076 SQLSerasi.exe 68 PID 4076 wrote to memory of 4712 4076 SQLSerasi.exe 68 PID 4076 wrote to memory of 4712 4076 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe"C:\Users\Admin\AppData\Local\Temp\559a38b6298b1f1cf0ca84cc3bc9a7f862097249771a0d4ac55c7f41dfaf9251.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD57aa421f618c13b157e96dd387c28dd0d
SHA1ca22d641bb67e0abcfa0a9636589da31cf875d73
SHA256c4611f68599a6b94200eecd412dae96e1ef31f021d938e6af67afe07677ffd92
SHA51215109d6423d041615b89d20f944f926c303209d4649024d0a5f5d5a562863c898d9945d836e60118fadeb290e1164c83a3b96cb7877ea3235800934c25a3be0a
-
Filesize
39.4MB
MD57aa421f618c13b157e96dd387c28dd0d
SHA1ca22d641bb67e0abcfa0a9636589da31cf875d73
SHA256c4611f68599a6b94200eecd412dae96e1ef31f021d938e6af67afe07677ffd92
SHA51215109d6423d041615b89d20f944f926c303209d4649024d0a5f5d5a562863c898d9945d836e60118fadeb290e1164c83a3b96cb7877ea3235800934c25a3be0a
-
Filesize
39.4MB
MD57aa421f618c13b157e96dd387c28dd0d
SHA1ca22d641bb67e0abcfa0a9636589da31cf875d73
SHA256c4611f68599a6b94200eecd412dae96e1ef31f021d938e6af67afe07677ffd92
SHA51215109d6423d041615b89d20f944f926c303209d4649024d0a5f5d5a562863c898d9945d836e60118fadeb290e1164c83a3b96cb7877ea3235800934c25a3be0a
-
Filesize
39.4MB
MD57aa421f618c13b157e96dd387c28dd0d
SHA1ca22d641bb67e0abcfa0a9636589da31cf875d73
SHA256c4611f68599a6b94200eecd412dae96e1ef31f021d938e6af67afe07677ffd92
SHA51215109d6423d041615b89d20f944f926c303209d4649024d0a5f5d5a562863c898d9945d836e60118fadeb290e1164c83a3b96cb7877ea3235800934c25a3be0a