Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/09/2022, 08:24
Static task
static1
General
-
Target
35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe
-
Size
375KB
-
MD5
ec58e02fb30073df2693487b65121774
-
SHA1
1d4c8c854b7b1c277270cfc894108c619e2b7b1d
-
SHA256
35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652
-
SHA512
7dac4dd56f8dcb782bc6e5217a9b6a48d39b074bca13ed9ed1a26a0b300c248af075ed5b04fd40d5e0e56f832c6912c8c0ac2f6b0766d535866473b441259eae
-
SSDEEP
6144:Hv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:H4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/3992-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3992-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3992-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3992-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4296-271-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4580-298-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4784-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4580-368-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4296 SQLSerasi.exe 4580 SQLSerasi.exe 4784 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3992-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3992-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3992-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3992-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3992-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4296-271-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4580-298-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4784-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4580-368-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3992 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe Token: SeDebugPrivilege 4296 SQLSerasi.exe Token: SeDebugPrivilege 4580 SQLSerasi.exe Token: SeDebugPrivilege 4580 SQLSerasi.exe Token: SeDebugPrivilege 4784 SQLSerasi.exe Token: SeDebugPrivilege 4784 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4296 3992 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe 67 PID 3992 wrote to memory of 4296 3992 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe 67 PID 3992 wrote to memory of 4296 3992 35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe 67 PID 4580 wrote to memory of 4784 4580 SQLSerasi.exe 69 PID 4580 wrote to memory of 4784 4580 SQLSerasi.exe 69 PID 4580 wrote to memory of 4784 4580 SQLSerasi.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe"C:\Users\Admin\AppData\Local\Temp\35ab6933aba188dddc68788ed02ee1f72894933331a110606af6cc9448045652.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5731fc344b1567ee7394d15af773e7821
SHA14f5fd3aedaad326f98fb943330470d5d02b35ef7
SHA2563cadbd7fcab8562a9c8d45dcb6c227e58e7a4f396c2f410873f4da819bb05d97
SHA5120143c66824df8be6851c1e2dfa28cebf75be6f516346cde269bbe3ac5223b56efdc092f5c243f7710b15c2f3957bbf568ff9b6a4153addff3778a7c80bcc76bd
-
Filesize
39.4MB
MD5731fc344b1567ee7394d15af773e7821
SHA14f5fd3aedaad326f98fb943330470d5d02b35ef7
SHA2563cadbd7fcab8562a9c8d45dcb6c227e58e7a4f396c2f410873f4da819bb05d97
SHA5120143c66824df8be6851c1e2dfa28cebf75be6f516346cde269bbe3ac5223b56efdc092f5c243f7710b15c2f3957bbf568ff9b6a4153addff3778a7c80bcc76bd
-
Filesize
39.4MB
MD5731fc344b1567ee7394d15af773e7821
SHA14f5fd3aedaad326f98fb943330470d5d02b35ef7
SHA2563cadbd7fcab8562a9c8d45dcb6c227e58e7a4f396c2f410873f4da819bb05d97
SHA5120143c66824df8be6851c1e2dfa28cebf75be6f516346cde269bbe3ac5223b56efdc092f5c243f7710b15c2f3957bbf568ff9b6a4153addff3778a7c80bcc76bd
-
Filesize
39.4MB
MD5731fc344b1567ee7394d15af773e7821
SHA14f5fd3aedaad326f98fb943330470d5d02b35ef7
SHA2563cadbd7fcab8562a9c8d45dcb6c227e58e7a4f396c2f410873f4da819bb05d97
SHA5120143c66824df8be6851c1e2dfa28cebf75be6f516346cde269bbe3ac5223b56efdc092f5c243f7710b15c2f3957bbf568ff9b6a4153addff3778a7c80bcc76bd