Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 02:26
Static task
static1
General
-
Target
ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe
-
Size
375KB
-
MD5
6612b0efd134a3c02db3460d1021a07c
-
SHA1
c63625fdfc7504ae2620617a334abf6ecbed59b3
-
SHA256
ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872
-
SHA512
b137caa811586776ceedd6cb4d53f8adccdfe656e492b1092c22390a7278cf0d9932cdfa926ad209438da2a5cf7cb8e2a0c0be87067024c009ef1f4df82dc62c
-
SSDEEP
6144:pv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:p4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/4744-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4744-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4744-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4744-179-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5028-254-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2284-304-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2284-307-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3924-362-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 5028 SQLSerasi.exe 2284 SQLSerasi.exe 3924 SQLSerasi.exe -
resource yara_rule behavioral1/memory/4744-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4744-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4744-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4744-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4744-179-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5028-254-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2284-304-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2284-307-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3924-362-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4744 ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe Token: SeDebugPrivilege 5028 SQLSerasi.exe Token: SeDebugPrivilege 2284 SQLSerasi.exe Token: SeDebugPrivilege 2284 SQLSerasi.exe Token: SeDebugPrivilege 3924 SQLSerasi.exe Token: SeDebugPrivilege 3924 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 5028 4744 ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe 67 PID 4744 wrote to memory of 5028 4744 ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe 67 PID 4744 wrote to memory of 5028 4744 ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe 67 PID 2284 wrote to memory of 3924 2284 SQLSerasi.exe 69 PID 2284 wrote to memory of 3924 2284 SQLSerasi.exe 69 PID 2284 wrote to memory of 3924 2284 SQLSerasi.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe"C:\Users\Admin\AppData\Local\Temp\ab0ef23bdafaaf5e5f11245067e6f19ef3c28a5745978bd927ed7aa7f8cf5872.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5b1e9c48bd4f285e5584e89d156710d1e
SHA1e1f80e4e105a740978b1874caac6c4b8d5b11797
SHA256599acc9b4effe9b2fedd0595c8ffa50c52cd520b031046e270a39cdfcc3a91f6
SHA5120fa3245ff21a8c425ac6d1d841af97511126f93b251111388a07400a93044a77f88597544eadc4c1defb32e8b7a5d31b4e3bc90ec5efc250ae6364bb4325a65b
-
Filesize
39.4MB
MD5b1e9c48bd4f285e5584e89d156710d1e
SHA1e1f80e4e105a740978b1874caac6c4b8d5b11797
SHA256599acc9b4effe9b2fedd0595c8ffa50c52cd520b031046e270a39cdfcc3a91f6
SHA5120fa3245ff21a8c425ac6d1d841af97511126f93b251111388a07400a93044a77f88597544eadc4c1defb32e8b7a5d31b4e3bc90ec5efc250ae6364bb4325a65b
-
Filesize
39.4MB
MD5b1e9c48bd4f285e5584e89d156710d1e
SHA1e1f80e4e105a740978b1874caac6c4b8d5b11797
SHA256599acc9b4effe9b2fedd0595c8ffa50c52cd520b031046e270a39cdfcc3a91f6
SHA5120fa3245ff21a8c425ac6d1d841af97511126f93b251111388a07400a93044a77f88597544eadc4c1defb32e8b7a5d31b4e3bc90ec5efc250ae6364bb4325a65b
-
Filesize
39.4MB
MD5b1e9c48bd4f285e5584e89d156710d1e
SHA1e1f80e4e105a740978b1874caac6c4b8d5b11797
SHA256599acc9b4effe9b2fedd0595c8ffa50c52cd520b031046e270a39cdfcc3a91f6
SHA5120fa3245ff21a8c425ac6d1d841af97511126f93b251111388a07400a93044a77f88597544eadc4c1defb32e8b7a5d31b4e3bc90ec5efc250ae6364bb4325a65b