Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2022, 16:28
Static task
static1
General
-
Target
546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe
-
Size
375KB
-
MD5
9d7e7fde20f5710664606ccdd399f4e9
-
SHA1
88f3280f5341220a7e76a3f5f30060e36cf14e6f
-
SHA256
546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce
-
SHA512
b1835f491a74d96c6e4d41397368bd38a78411ddfc59377067724c861b8c286da82d9e7299ab392eb317f5a4bdce5fd825b1d247e0a1258e026941e7af03eb57
-
SSDEEP
6144:Ev5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:E4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2156-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2156-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2156-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4740-152-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4740-153-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4740-158-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4688-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4788-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4512-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4688-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 4688 SQLSerasi.exe 4740 SQLSerasi.exe 4788 SQLSerasi.exe 4512 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2156-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2156-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2156-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2156-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4740-149-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4740-152-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4740-153-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4740-158-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4512-176-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3640 4740 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2156 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe Token: SeDebugPrivilege 4688 SQLSerasi.exe Token: SeDebugPrivilege 4740 SQLSerasi.exe Token: SeDebugPrivilege 4740 SQLSerasi.exe Token: SeDebugPrivilege 4740 SQLSerasi.exe Token: SeDebugPrivilege 4788 SQLSerasi.exe Token: SeDebugPrivilege 4512 SQLSerasi.exe Token: SeDebugPrivilege 4512 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4688 2156 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe 81 PID 2156 wrote to memory of 4688 2156 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe 81 PID 2156 wrote to memory of 4688 2156 546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe 81 PID 4740 wrote to memory of 4788 4740 SQLSerasi.exe 83 PID 4740 wrote to memory of 4788 4740 SQLSerasi.exe 83 PID 4740 wrote to memory of 4788 4740 SQLSerasi.exe 83 PID 4740 wrote to memory of 4512 4740 SQLSerasi.exe 84 PID 4740 wrote to memory of 4512 4740 SQLSerasi.exe 84 PID 4740 wrote to memory of 4512 4740 SQLSerasi.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe"C:\Users\Admin\AppData\Local\Temp\546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 6482⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4740 -ip 47401⤵PID:1264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD536c2d4f2746b880b46955bd5ff4676b6
SHA12c0693309f0f80f65c1483708c2da292cbfba2cf
SHA256bf41cd62617a55b6378a4f9385e1abb9b31324d815cee139362d6fe4a8375c95
SHA512a35bb72e478f21afaebdb67e5dfc519564a2334ee2ea34c5a69c32c99dd2efe28a5eefa5ae0c11346afd566f00c75616ee3d764462e484683014257e929ffed0
-
Filesize
39.4MB
MD536c2d4f2746b880b46955bd5ff4676b6
SHA12c0693309f0f80f65c1483708c2da292cbfba2cf
SHA256bf41cd62617a55b6378a4f9385e1abb9b31324d815cee139362d6fe4a8375c95
SHA512a35bb72e478f21afaebdb67e5dfc519564a2334ee2ea34c5a69c32c99dd2efe28a5eefa5ae0c11346afd566f00c75616ee3d764462e484683014257e929ffed0
-
Filesize
39.4MB
MD536c2d4f2746b880b46955bd5ff4676b6
SHA12c0693309f0f80f65c1483708c2da292cbfba2cf
SHA256bf41cd62617a55b6378a4f9385e1abb9b31324d815cee139362d6fe4a8375c95
SHA512a35bb72e478f21afaebdb67e5dfc519564a2334ee2ea34c5a69c32c99dd2efe28a5eefa5ae0c11346afd566f00c75616ee3d764462e484683014257e929ffed0
-
Filesize
39.4MB
MD536c2d4f2746b880b46955bd5ff4676b6
SHA12c0693309f0f80f65c1483708c2da292cbfba2cf
SHA256bf41cd62617a55b6378a4f9385e1abb9b31324d815cee139362d6fe4a8375c95
SHA512a35bb72e478f21afaebdb67e5dfc519564a2334ee2ea34c5a69c32c99dd2efe28a5eefa5ae0c11346afd566f00c75616ee3d764462e484683014257e929ffed0
-
Filesize
39.4MB
MD536c2d4f2746b880b46955bd5ff4676b6
SHA12c0693309f0f80f65c1483708c2da292cbfba2cf
SHA256bf41cd62617a55b6378a4f9385e1abb9b31324d815cee139362d6fe4a8375c95
SHA512a35bb72e478f21afaebdb67e5dfc519564a2334ee2ea34c5a69c32c99dd2efe28a5eefa5ae0c11346afd566f00c75616ee3d764462e484683014257e929ffed0