Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-09-2022 13:14
Static task
static1
General
-
Target
0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe
-
Size
375KB
-
MD5
43bff6f22c04972f1272fe00522d2e48
-
SHA1
d489f5695d0d89681849113c790da20d869760ad
-
SHA256
0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e
-
SHA512
37eff228ea40ddac6945cc806bdd52ef223a193ec0361c1658e090dea47fe43c112fa193e61dba906a8ae38e68c9757c2d4b47f9f904690448d3616426f4f506
-
SSDEEP
6144:Ov5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:O4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2496-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2496-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2496-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2496-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3452-268-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1200-301-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/996-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/996-370-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3452 SQLSerasi.exe 1200 SQLSerasi.exe 996 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2496-167-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2496-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2496-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2496-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2496-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3452-268-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1200-301-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/996-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/996-370-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2496 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe Token: SeDebugPrivilege 3452 SQLSerasi.exe Token: SeDebugPrivilege 1200 SQLSerasi.exe Token: SeDebugPrivilege 1200 SQLSerasi.exe Token: SeDebugPrivilege 996 SQLSerasi.exe Token: SeDebugPrivilege 996 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3452 2496 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe 66 PID 2496 wrote to memory of 3452 2496 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe 66 PID 2496 wrote to memory of 3452 2496 0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe 66 PID 1200 wrote to memory of 996 1200 SQLSerasi.exe 68 PID 1200 wrote to memory of 996 1200 SQLSerasi.exe 68 PID 1200 wrote to memory of 996 1200 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe"C:\Users\Admin\AppData\Local\Temp\0be4c1f499bcd863c5210e08209426c77d9b50cd6c43ac4e85c5649f1fd8f54e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD59bc5b7da4066a55c4f7f2395f99d4a52
SHA15d8ec49a586d8789d312221f6fe75f3f09f0fc21
SHA25665611d988fb8d5d1f6cff4508c020ac1c7926d8a7e267e7d3bb100c5a492c140
SHA512ec8c6168bf9601154e23f03bd5773b86412b0b62e3040c400bb56307dd3c0554e1e9b2f44c62dd5bf83269b78a2d2cee9aeecf87574985ec206bac7364e3b525
-
Filesize
39.4MB
MD59bc5b7da4066a55c4f7f2395f99d4a52
SHA15d8ec49a586d8789d312221f6fe75f3f09f0fc21
SHA25665611d988fb8d5d1f6cff4508c020ac1c7926d8a7e267e7d3bb100c5a492c140
SHA512ec8c6168bf9601154e23f03bd5773b86412b0b62e3040c400bb56307dd3c0554e1e9b2f44c62dd5bf83269b78a2d2cee9aeecf87574985ec206bac7364e3b525
-
Filesize
39.4MB
MD59bc5b7da4066a55c4f7f2395f99d4a52
SHA15d8ec49a586d8789d312221f6fe75f3f09f0fc21
SHA25665611d988fb8d5d1f6cff4508c020ac1c7926d8a7e267e7d3bb100c5a492c140
SHA512ec8c6168bf9601154e23f03bd5773b86412b0b62e3040c400bb56307dd3c0554e1e9b2f44c62dd5bf83269b78a2d2cee9aeecf87574985ec206bac7364e3b525
-
Filesize
39.4MB
MD59bc5b7da4066a55c4f7f2395f99d4a52
SHA15d8ec49a586d8789d312221f6fe75f3f09f0fc21
SHA25665611d988fb8d5d1f6cff4508c020ac1c7926d8a7e267e7d3bb100c5a492c140
SHA512ec8c6168bf9601154e23f03bd5773b86412b0b62e3040c400bb56307dd3c0554e1e9b2f44c62dd5bf83269b78a2d2cee9aeecf87574985ec206bac7364e3b525