Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 15:55
Static task
static1
General
-
Target
58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe
-
Size
375KB
-
MD5
cf97afd7801a1107d30d141f569952a5
-
SHA1
85c1f4208dd000a73b1bc5c188c882a79048c932
-
SHA256
58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4
-
SHA512
fb6bea566a013ed2f599b3d230e88d375a8253cf56f1dda0b14e175ecb63518a4564d1d682712e897f84576c6b4ad8ec2ca0c982c5d49886c096317bbb901ffd
-
SSDEEP
6144:Kv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:K4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2972-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2972-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2972-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2972-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4180-246-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1480-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1480-303-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4108-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1480-371-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4108-373-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4180 SQLSerasi.exe 1480 SQLSerasi.exe 4108 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2972-168-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2972-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2972-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2972-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2972-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4180-246-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1480-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1480-303-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4108-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1480-371-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4108-373-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2972 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe Token: SeDebugPrivilege 4180 SQLSerasi.exe Token: SeDebugPrivilege 1480 SQLSerasi.exe Token: SeDebugPrivilege 1480 SQLSerasi.exe Token: SeDebugPrivilege 4108 SQLSerasi.exe Token: SeDebugPrivilege 4108 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4180 2972 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe 66 PID 2972 wrote to memory of 4180 2972 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe 66 PID 2972 wrote to memory of 4180 2972 58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe 66 PID 1480 wrote to memory of 4108 1480 SQLSerasi.exe 68 PID 1480 wrote to memory of 4108 1480 SQLSerasi.exe 68 PID 1480 wrote to memory of 4108 1480 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe"C:\Users\Admin\AppData\Local\Temp\58d686d2e6d1bbffd11423d9aa12be20fa853508477edabf8de99938f3c5d5c4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD50eebc264cc0d2845cf317a03bb4d6024
SHA17a386c87866d26bee33a504d2a999969d7e09548
SHA256661d2853f46d6a2e06f81886152b305b13bd1b2fed46cde2a68143e2ec9ad084
SHA5120294c4bc5513093349db014c684535e02fbda8488c8b1e3e724d7764c30f43e8aa3a28cc5b999e1019b97e89e627d6153141f5539f69b4a77e92e2bb4d153d64
-
Filesize
39.4MB
MD50eebc264cc0d2845cf317a03bb4d6024
SHA17a386c87866d26bee33a504d2a999969d7e09548
SHA256661d2853f46d6a2e06f81886152b305b13bd1b2fed46cde2a68143e2ec9ad084
SHA5120294c4bc5513093349db014c684535e02fbda8488c8b1e3e724d7764c30f43e8aa3a28cc5b999e1019b97e89e627d6153141f5539f69b4a77e92e2bb4d153d64
-
Filesize
39.4MB
MD50eebc264cc0d2845cf317a03bb4d6024
SHA17a386c87866d26bee33a504d2a999969d7e09548
SHA256661d2853f46d6a2e06f81886152b305b13bd1b2fed46cde2a68143e2ec9ad084
SHA5120294c4bc5513093349db014c684535e02fbda8488c8b1e3e724d7764c30f43e8aa3a28cc5b999e1019b97e89e627d6153141f5539f69b4a77e92e2bb4d153d64
-
Filesize
39.4MB
MD50eebc264cc0d2845cf317a03bb4d6024
SHA17a386c87866d26bee33a504d2a999969d7e09548
SHA256661d2853f46d6a2e06f81886152b305b13bd1b2fed46cde2a68143e2ec9ad084
SHA5120294c4bc5513093349db014c684535e02fbda8488c8b1e3e724d7764c30f43e8aa3a28cc5b999e1019b97e89e627d6153141f5539f69b4a77e92e2bb4d153d64