Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/09/2022, 10:31
Static task
static1
General
-
Target
983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe
-
Size
375KB
-
MD5
59b28ad37de2a30f545eb57f62424787
-
SHA1
3bd7ac022780aeb95268933ccdb5aaefed0f6cca
-
SHA256
983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af
-
SHA512
b959c8a21b04229447c4068d4310a27153c4c707f89e87f20cb3e3bb0c922292aec9ef50445422e052bd844233f4ee7b023e32b883e76b2260f23b7776ad572e
-
SSDEEP
6144:Ov5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:O4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2456-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2456-169-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2456-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2456-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1752-289-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1088-300-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1088-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2260-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2260-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 1752 SQLSerasi.exe 1088 SQLSerasi.exe 2260 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2456-165-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2456-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2456-169-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2456-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2456-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1752-289-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1088-300-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1088-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2260-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2260-369-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2456 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe Token: SeDebugPrivilege 1752 SQLSerasi.exe Token: SeDebugPrivilege 1088 SQLSerasi.exe Token: SeDebugPrivilege 1088 SQLSerasi.exe Token: SeDebugPrivilege 2260 SQLSerasi.exe Token: SeDebugPrivilege 2260 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1752 2456 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe 66 PID 2456 wrote to memory of 1752 2456 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe 66 PID 2456 wrote to memory of 1752 2456 983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe 66 PID 1088 wrote to memory of 2260 1088 SQLSerasi.exe 68 PID 1088 wrote to memory of 2260 1088 SQLSerasi.exe 68 PID 1088 wrote to memory of 2260 1088 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe"C:\Users\Admin\AppData\Local\Temp\983de98690587d77d97e4027f4e5e1d7f889e04068adf26053583486e84277af.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5662be0e50ce576f1e710e9fa947f705f
SHA11ac2a7a8cbbe38627346b4402e8da9ad6630b1bf
SHA256114f7f33e886fcf7a412b97c1646e9b0994269433a54b0c551302428a0f4c6be
SHA512a473bacae5b920916291fd3dce3cfb113df83d98af2b462adcc3aa17b3181a38e38cb7f68e4e29a56d564837a29b3f830bfef7b4566d7021f0d7c3569855097e
-
Filesize
39.4MB
MD5662be0e50ce576f1e710e9fa947f705f
SHA11ac2a7a8cbbe38627346b4402e8da9ad6630b1bf
SHA256114f7f33e886fcf7a412b97c1646e9b0994269433a54b0c551302428a0f4c6be
SHA512a473bacae5b920916291fd3dce3cfb113df83d98af2b462adcc3aa17b3181a38e38cb7f68e4e29a56d564837a29b3f830bfef7b4566d7021f0d7c3569855097e
-
Filesize
39.4MB
MD5662be0e50ce576f1e710e9fa947f705f
SHA11ac2a7a8cbbe38627346b4402e8da9ad6630b1bf
SHA256114f7f33e886fcf7a412b97c1646e9b0994269433a54b0c551302428a0f4c6be
SHA512a473bacae5b920916291fd3dce3cfb113df83d98af2b462adcc3aa17b3181a38e38cb7f68e4e29a56d564837a29b3f830bfef7b4566d7021f0d7c3569855097e
-
Filesize
39.4MB
MD5662be0e50ce576f1e710e9fa947f705f
SHA11ac2a7a8cbbe38627346b4402e8da9ad6630b1bf
SHA256114f7f33e886fcf7a412b97c1646e9b0994269433a54b0c551302428a0f4c6be
SHA512a473bacae5b920916291fd3dce3cfb113df83d98af2b462adcc3aa17b3181a38e38cb7f68e4e29a56d564837a29b3f830bfef7b4566d7021f0d7c3569855097e