Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/09/2022, 04:54
Static task
static1
General
-
Target
ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe
-
Size
375KB
-
MD5
0e2a6a8f19907efeaa1f7d89d2101445
-
SHA1
b897314497f0be93f1ebedb46423749e511665ad
-
SHA256
ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51
-
SHA512
472042938baf02d4540d9c1b1cefdb07688e0234fca5747e1d9d63371fc535d16a2aa06441c7d6b7ed9f4691aaffa45dc54d35cce4c47eb266f28e5c199e007c
-
SSDEEP
6144:Vv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:V4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2208-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2208-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2208-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3976-277-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5004-301-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5004-304-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4548-361-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4548-362-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3976 SQLSerasi.exe 5004 SQLSerasi.exe 4548 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2208-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2208-178-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3976-277-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5004-301-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5004-304-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4548-361-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4548-362-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2208 ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe Token: SeDebugPrivilege 3976 SQLSerasi.exe Token: SeDebugPrivilege 5004 SQLSerasi.exe Token: SeDebugPrivilege 5004 SQLSerasi.exe Token: SeDebugPrivilege 4548 SQLSerasi.exe Token: SeDebugPrivilege 4548 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3976 2208 ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe 66 PID 2208 wrote to memory of 3976 2208 ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe 66 PID 2208 wrote to memory of 3976 2208 ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe 66 PID 5004 wrote to memory of 4548 5004 SQLSerasi.exe 68 PID 5004 wrote to memory of 4548 5004 SQLSerasi.exe 68 PID 5004 wrote to memory of 4548 5004 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe"C:\Users\Admin\AppData\Local\Temp\ce7a3b15a43d4e41d2e92f4beda30bdb9278658bacb28254e1ef74e3887bfc51.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD574fbc5a189a7d90f880ab64078f4b4c4
SHA140ea5bfa32d8fce08aea84587d7c438513b9caab
SHA256c288904ef4b3c597adf14f9b79465493048064cc93a4ec32b0d0c9bff4e7c37c
SHA51258ed688ee9b82f4a7249d5a9cd462ac3991534e976de37b7ec426e64e08337713c756599249d4fb6603f6b52087d31c717c7f40cad22cb28a76db6bc75e1d62c
-
Filesize
39.4MB
MD574fbc5a189a7d90f880ab64078f4b4c4
SHA140ea5bfa32d8fce08aea84587d7c438513b9caab
SHA256c288904ef4b3c597adf14f9b79465493048064cc93a4ec32b0d0c9bff4e7c37c
SHA51258ed688ee9b82f4a7249d5a9cd462ac3991534e976de37b7ec426e64e08337713c756599249d4fb6603f6b52087d31c717c7f40cad22cb28a76db6bc75e1d62c
-
Filesize
39.4MB
MD574fbc5a189a7d90f880ab64078f4b4c4
SHA140ea5bfa32d8fce08aea84587d7c438513b9caab
SHA256c288904ef4b3c597adf14f9b79465493048064cc93a4ec32b0d0c9bff4e7c37c
SHA51258ed688ee9b82f4a7249d5a9cd462ac3991534e976de37b7ec426e64e08337713c756599249d4fb6603f6b52087d31c717c7f40cad22cb28a76db6bc75e1d62c
-
Filesize
39.4MB
MD574fbc5a189a7d90f880ab64078f4b4c4
SHA140ea5bfa32d8fce08aea84587d7c438513b9caab
SHA256c288904ef4b3c597adf14f9b79465493048064cc93a4ec32b0d0c9bff4e7c37c
SHA51258ed688ee9b82f4a7249d5a9cd462ac3991534e976de37b7ec426e64e08337713c756599249d4fb6603f6b52087d31c717c7f40cad22cb28a76db6bc75e1d62c