Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2022, 11:53
Static task
static1
General
-
Target
f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe
-
Size
375KB
-
MD5
eb7dc94ca9632e2a87512d02157dae90
-
SHA1
db586830f7121c55b27898d3892e1d16f774505b
-
SHA256
f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da
-
SHA512
820c5b8b097b27ecff2518d4d46a0afb7d5a4939f0e24b389b508f7f0413507280b86cf3f117fc4e3076cee94865bf1f7a26fc6b861b9154318aed19b4f83f1d
-
SSDEEP
6144:Gv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:G4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/4036-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4036-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4036-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4280-276-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4920-298-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4824-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4920-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4824-370-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4280 SQLSerasi.exe 4920 SQLSerasi.exe 4824 SQLSerasi.exe -
resource yara_rule behavioral1/memory/4036-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4036-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4036-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4036-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4280-276-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4920-298-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4824-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4920-369-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4824-370-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4036 f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe Token: SeDebugPrivilege 4280 SQLSerasi.exe Token: SeDebugPrivilege 4920 SQLSerasi.exe Token: SeDebugPrivilege 4920 SQLSerasi.exe Token: SeDebugPrivilege 4824 SQLSerasi.exe Token: SeDebugPrivilege 4824 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4280 4036 f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe 66 PID 4036 wrote to memory of 4280 4036 f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe 66 PID 4036 wrote to memory of 4280 4036 f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe 66 PID 4920 wrote to memory of 4824 4920 SQLSerasi.exe 68 PID 4920 wrote to memory of 4824 4920 SQLSerasi.exe 68 PID 4920 wrote to memory of 4824 4920 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe"C:\Users\Admin\AppData\Local\Temp\f89fee078475ff2737db0c310c59aeeb7c8f85f658ad9867c40601aebbbe54da.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD50ce254a27a099f44b8229d5214fcc7c2
SHA1da0e424b66dc5dcb141be8d8848ca14b78a124f1
SHA2568d5ed6c4b263a678f38383d2e22d47f6a912e4986aa646b087f5b6c1e27bdefd
SHA5126c393b9bc7939b27c4f663dae66c8fe3b13f491bbbe1a0d375122e9879f91d943c33900f665f5dac3a201456392abb81b4821c28adf6b193b68bb08aff2e6669
-
Filesize
39.4MB
MD50ce254a27a099f44b8229d5214fcc7c2
SHA1da0e424b66dc5dcb141be8d8848ca14b78a124f1
SHA2568d5ed6c4b263a678f38383d2e22d47f6a912e4986aa646b087f5b6c1e27bdefd
SHA5126c393b9bc7939b27c4f663dae66c8fe3b13f491bbbe1a0d375122e9879f91d943c33900f665f5dac3a201456392abb81b4821c28adf6b193b68bb08aff2e6669
-
Filesize
39.4MB
MD50ce254a27a099f44b8229d5214fcc7c2
SHA1da0e424b66dc5dcb141be8d8848ca14b78a124f1
SHA2568d5ed6c4b263a678f38383d2e22d47f6a912e4986aa646b087f5b6c1e27bdefd
SHA5126c393b9bc7939b27c4f663dae66c8fe3b13f491bbbe1a0d375122e9879f91d943c33900f665f5dac3a201456392abb81b4821c28adf6b193b68bb08aff2e6669
-
Filesize
39.4MB
MD50ce254a27a099f44b8229d5214fcc7c2
SHA1da0e424b66dc5dcb141be8d8848ca14b78a124f1
SHA2568d5ed6c4b263a678f38383d2e22d47f6a912e4986aa646b087f5b6c1e27bdefd
SHA5126c393b9bc7939b27c4f663dae66c8fe3b13f491bbbe1a0d375122e9879f91d943c33900f665f5dac3a201456392abb81b4821c28adf6b193b68bb08aff2e6669