Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 11:12
Static task
static1
General
-
Target
f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe
-
Size
375KB
-
MD5
29d1cbeba8b4d013af041c1564c99962
-
SHA1
e43fbcb36a13bbccacc7f7aab8bcdaf07215d7e6
-
SHA256
f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249
-
SHA512
206ba54dfa84b47df84ca439e5485f3b00b7b9586d62d03bafce08c677d7588d5dc034f236582a5eb422aa7e47699ba5c531bebd11c7885f4f3e4e02aa4fb84d
-
SSDEEP
6144:Pv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:P4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/4528-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4528-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4528-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1412-148-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3644-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3644-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3644-158-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4676-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4728-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 1412 SQLSerasi.exe 3644 SQLSerasi.exe 4676 SQLSerasi.exe 4728 SQLSerasi.exe -
resource yara_rule behavioral1/memory/4528-132-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4528-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4528-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4528-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1412-148-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3644-151-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3644-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3644-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3644-158-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4728-177-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4940 3644 WerFault.exe 77 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4528 f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe Token: SeDebugPrivilege 1412 SQLSerasi.exe Token: SeDebugPrivilege 3644 SQLSerasi.exe Token: SeDebugPrivilege 3644 SQLSerasi.exe Token: SeDebugPrivilege 3644 SQLSerasi.exe Token: SeDebugPrivilege 4676 SQLSerasi.exe Token: SeDebugPrivilege 4728 SQLSerasi.exe Token: SeDebugPrivilege 4728 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1412 4528 f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe 76 PID 4528 wrote to memory of 1412 4528 f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe 76 PID 4528 wrote to memory of 1412 4528 f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe 76 PID 3644 wrote to memory of 4676 3644 SQLSerasi.exe 81 PID 3644 wrote to memory of 4676 3644 SQLSerasi.exe 81 PID 3644 wrote to memory of 4676 3644 SQLSerasi.exe 81 PID 3644 wrote to memory of 4728 3644 SQLSerasi.exe 80 PID 3644 wrote to memory of 4728 3644 SQLSerasi.exe 80 PID 3644 wrote to memory of 4728 3644 SQLSerasi.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe"C:\Users\Admin\AppData\Local\Temp\f9e04fc9b76fe29933cd8e911dda1289323e9d15d3601fe25116b4a7b5c3f249.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 5762⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 3644 -ip 36441⤵PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD514afe636761291d58b321486d6814365
SHA1033337d929f136b2416aa8147e7e5e2e37d0d210
SHA256c594cd8100a75e1be23e2013c23ac6ada0956bac6aee7bdffdbf3e391aab7411
SHA51252ebb86868b600b2d1e178eb08c2a3de2dd2149e013d7ad5ef808f694303d889fd5c875dfd79a62828af2173780e05ebd2a943d54ad046e35bee278f37edf17c
-
Filesize
39.4MB
MD514afe636761291d58b321486d6814365
SHA1033337d929f136b2416aa8147e7e5e2e37d0d210
SHA256c594cd8100a75e1be23e2013c23ac6ada0956bac6aee7bdffdbf3e391aab7411
SHA51252ebb86868b600b2d1e178eb08c2a3de2dd2149e013d7ad5ef808f694303d889fd5c875dfd79a62828af2173780e05ebd2a943d54ad046e35bee278f37edf17c
-
Filesize
39.4MB
MD514afe636761291d58b321486d6814365
SHA1033337d929f136b2416aa8147e7e5e2e37d0d210
SHA256c594cd8100a75e1be23e2013c23ac6ada0956bac6aee7bdffdbf3e391aab7411
SHA51252ebb86868b600b2d1e178eb08c2a3de2dd2149e013d7ad5ef808f694303d889fd5c875dfd79a62828af2173780e05ebd2a943d54ad046e35bee278f37edf17c
-
Filesize
39.4MB
MD514afe636761291d58b321486d6814365
SHA1033337d929f136b2416aa8147e7e5e2e37d0d210
SHA256c594cd8100a75e1be23e2013c23ac6ada0956bac6aee7bdffdbf3e391aab7411
SHA51252ebb86868b600b2d1e178eb08c2a3de2dd2149e013d7ad5ef808f694303d889fd5c875dfd79a62828af2173780e05ebd2a943d54ad046e35bee278f37edf17c
-
Filesize
39.4MB
MD514afe636761291d58b321486d6814365
SHA1033337d929f136b2416aa8147e7e5e2e37d0d210
SHA256c594cd8100a75e1be23e2013c23ac6ada0956bac6aee7bdffdbf3e391aab7411
SHA51252ebb86868b600b2d1e178eb08c2a3de2dd2149e013d7ad5ef808f694303d889fd5c875dfd79a62828af2173780e05ebd2a943d54ad046e35bee278f37edf17c