Analysis
-
max time kernel
129s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 03:23
Static task
static1
General
-
Target
cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe
-
Size
375KB
-
MD5
dc4914df753ca74d9d0e92f78a26d5e7
-
SHA1
779c5c27edcdad178ad004885f040af6c67ff645
-
SHA256
cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5
-
SHA512
665585f85c3944ac4306ef278823a52640330f24f09648ff73c899eb9147d262db8962c9bad280f290deb2aa1071504e51d59fd64e90fbb20c3da0c4f36b420c
-
SSDEEP
6144:iv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:i4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/64-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/64-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/64-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4528-257-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4012-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4944-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4944-372-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4528 SQLSerasi.exe 4012 SQLSerasi.exe 4944 SQLSerasi.exe -
resource yara_rule behavioral1/memory/64-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/64-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/64-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/64-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4528-257-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4012-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4944-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4944-372-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 64 cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe Token: SeDebugPrivilege 4528 SQLSerasi.exe Token: SeDebugPrivilege 4012 SQLSerasi.exe Token: SeDebugPrivilege 4012 SQLSerasi.exe Token: SeDebugPrivilege 4944 SQLSerasi.exe Token: SeDebugPrivilege 4944 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 64 wrote to memory of 4528 64 cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe 66 PID 64 wrote to memory of 4528 64 cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe 66 PID 64 wrote to memory of 4528 64 cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe 66 PID 4012 wrote to memory of 4944 4012 SQLSerasi.exe 68 PID 4012 wrote to memory of 4944 4012 SQLSerasi.exe 68 PID 4012 wrote to memory of 4944 4012 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe"C:\Users\Admin\AppData\Local\Temp\cdfae35e3bafc0e6c4682b9373985f81e6e3260992e7fc0f645f0be7324ac7e5.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD52169db256db442127a00bfa1aa87ae4c
SHA1194e42201fe736e51f6cbbe771adef8c73186240
SHA256e22c320abc370f9cfa5f77600920b07647132fd98f928cfc663d1fa8186ba603
SHA51274836be89b2f300407d03e8f2ff1b7cfa6c8e5562952fc49088c0c56d0a57b6444361da6750518d2e2b0594805774b663733c448331d5cf600a1275ceb50b224
-
Filesize
39.4MB
MD52169db256db442127a00bfa1aa87ae4c
SHA1194e42201fe736e51f6cbbe771adef8c73186240
SHA256e22c320abc370f9cfa5f77600920b07647132fd98f928cfc663d1fa8186ba603
SHA51274836be89b2f300407d03e8f2ff1b7cfa6c8e5562952fc49088c0c56d0a57b6444361da6750518d2e2b0594805774b663733c448331d5cf600a1275ceb50b224
-
Filesize
39.4MB
MD52169db256db442127a00bfa1aa87ae4c
SHA1194e42201fe736e51f6cbbe771adef8c73186240
SHA256e22c320abc370f9cfa5f77600920b07647132fd98f928cfc663d1fa8186ba603
SHA51274836be89b2f300407d03e8f2ff1b7cfa6c8e5562952fc49088c0c56d0a57b6444361da6750518d2e2b0594805774b663733c448331d5cf600a1275ceb50b224
-
Filesize
39.4MB
MD52169db256db442127a00bfa1aa87ae4c
SHA1194e42201fe736e51f6cbbe771adef8c73186240
SHA256e22c320abc370f9cfa5f77600920b07647132fd98f928cfc663d1fa8186ba603
SHA51274836be89b2f300407d03e8f2ff1b7cfa6c8e5562952fc49088c0c56d0a57b6444361da6750518d2e2b0594805774b663733c448331d5cf600a1275ceb50b224