Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2022, 04:21
Static task
static1
General
-
Target
7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe
-
Size
375KB
-
MD5
854c05dd8236894e88e3ed49059eae45
-
SHA1
2a3751670d81cae7d5855e2598e59441e75560e3
-
SHA256
7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5
-
SHA512
0eb616289046e4decc6a5c849f46d761ba14a35c2acfed67eac536a1511e435860bf20f24eb71d33c6a44d8ef1eb23171b46e0ab07731aec0a42f9d61604ddbe
-
SSDEEP
6144:Dv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:D4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral1/memory/3404-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3404-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3404-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4788-153-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4788-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3700-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4788-157-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/216-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/216-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1276-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4788-180-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/216-181-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 3700 SQLSerasi.exe 4788 SQLSerasi.exe 216 SQLSerasi.exe 1276 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3404-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3404-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3404-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3404-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4788-150-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4788-153-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4788-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3700-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4788-157-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/216-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/216-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4788-180-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/216-181-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3488 4788 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3404 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe Token: SeDebugPrivilege 3700 SQLSerasi.exe Token: SeDebugPrivilege 4788 SQLSerasi.exe Token: SeDebugPrivilege 4788 SQLSerasi.exe Token: SeDebugPrivilege 4788 SQLSerasi.exe Token: SeDebugPrivilege 216 SQLSerasi.exe Token: SeDebugPrivilege 1276 SQLSerasi.exe Token: SeDebugPrivilege 216 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3404 wrote to memory of 3700 3404 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe 84 PID 3404 wrote to memory of 3700 3404 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe 84 PID 3404 wrote to memory of 3700 3404 7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe 84 PID 4788 wrote to memory of 216 4788 SQLSerasi.exe 86 PID 4788 wrote to memory of 216 4788 SQLSerasi.exe 86 PID 4788 wrote to memory of 216 4788 SQLSerasi.exe 86 PID 4788 wrote to memory of 1276 4788 SQLSerasi.exe 88 PID 4788 wrote to memory of 1276 4788 SQLSerasi.exe 88 PID 4788 wrote to memory of 1276 4788 SQLSerasi.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe"C:\Users\Admin\AppData\Local\Temp\7b8a31839689e75b7f4bf4dee6cda3b79c68cb798bf802a856564e65fa2620d5.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 6402⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4788 -ip 47881⤵PID:3464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5cbff2b9ae5627e6b11a286b164db1384
SHA169c55eb9e3b823a8c033a1f1f3ea0c9fa6cad4a7
SHA2561b1082434b63fd2914fe281b374ab8a9a8a6ac0724c219c957c64232d3fc9a9b
SHA5126edb9fadca8b1012c6884b480ff8f921a325d3af9824d9e39cacc437b07ad9673f089b1a33514ad485ebd49bdf534f11c94409b122a752909566df92f071e505
-
Filesize
39.4MB
MD5cbff2b9ae5627e6b11a286b164db1384
SHA169c55eb9e3b823a8c033a1f1f3ea0c9fa6cad4a7
SHA2561b1082434b63fd2914fe281b374ab8a9a8a6ac0724c219c957c64232d3fc9a9b
SHA5126edb9fadca8b1012c6884b480ff8f921a325d3af9824d9e39cacc437b07ad9673f089b1a33514ad485ebd49bdf534f11c94409b122a752909566df92f071e505
-
Filesize
39.4MB
MD5cbff2b9ae5627e6b11a286b164db1384
SHA169c55eb9e3b823a8c033a1f1f3ea0c9fa6cad4a7
SHA2561b1082434b63fd2914fe281b374ab8a9a8a6ac0724c219c957c64232d3fc9a9b
SHA5126edb9fadca8b1012c6884b480ff8f921a325d3af9824d9e39cacc437b07ad9673f089b1a33514ad485ebd49bdf534f11c94409b122a752909566df92f071e505
-
Filesize
39.4MB
MD5cbff2b9ae5627e6b11a286b164db1384
SHA169c55eb9e3b823a8c033a1f1f3ea0c9fa6cad4a7
SHA2561b1082434b63fd2914fe281b374ab8a9a8a6ac0724c219c957c64232d3fc9a9b
SHA5126edb9fadca8b1012c6884b480ff8f921a325d3af9824d9e39cacc437b07ad9673f089b1a33514ad485ebd49bdf534f11c94409b122a752909566df92f071e505
-
Filesize
39.4MB
MD5cbff2b9ae5627e6b11a286b164db1384
SHA169c55eb9e3b823a8c033a1f1f3ea0c9fa6cad4a7
SHA2561b1082434b63fd2914fe281b374ab8a9a8a6ac0724c219c957c64232d3fc9a9b
SHA5126edb9fadca8b1012c6884b480ff8f921a325d3af9824d9e39cacc437b07ad9673f089b1a33514ad485ebd49bdf534f11c94409b122a752909566df92f071e505