Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2022, 20:57

General

  • Target

    8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe

  • Size

    375KB

  • MD5

    4a2f1bed70e52a773c6473a07e4b080b

  • SHA1

    2f87a792d0042383c7c1a7ff6304afe7f33e471c

  • SHA256

    8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9

  • SHA512

    43a02d84c8f545e78f1fb0ae306f45b5eac8aa08c3b9bd40b3b23f535d60741b182a366c4aaef7a18e8ec94939977fef603d65302c215df613a1ef46a194e215

  • SSDEEP

    6144:Ov5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:O4VOiF1WD7kE1dTYOi8V5u23zmWFy4

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 14 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe
    "C:\Users\Admin\AppData\Local\Temp\8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4940
  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
    "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5096
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 644
      2⤵
      • Program crash
      PID:4092
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3016 -ip 3016
    1⤵
      PID:4236

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

      Filesize

      39.4MB

      MD5

      09f3badd8dba6799fc2ee96cfa2a702e

      SHA1

      915d63bd56136009da772eb7b38593d1ae8841f5

      SHA256

      e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223

      SHA512

      bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575

    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

      Filesize

      39.4MB

      MD5

      09f3badd8dba6799fc2ee96cfa2a702e

      SHA1

      915d63bd56136009da772eb7b38593d1ae8841f5

      SHA256

      e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223

      SHA512

      bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575

    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

      Filesize

      39.4MB

      MD5

      09f3badd8dba6799fc2ee96cfa2a702e

      SHA1

      915d63bd56136009da772eb7b38593d1ae8841f5

      SHA256

      e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223

      SHA512

      bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575

    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

      Filesize

      39.4MB

      MD5

      09f3badd8dba6799fc2ee96cfa2a702e

      SHA1

      915d63bd56136009da772eb7b38593d1ae8841f5

      SHA256

      e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223

      SHA512

      bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575

    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

      Filesize

      39.4MB

      MD5

      09f3badd8dba6799fc2ee96cfa2a702e

      SHA1

      915d63bd56136009da772eb7b38593d1ae8841f5

      SHA256

      e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223

      SHA512

      bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575

    • memory/3016-181-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/3016-158-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/3016-157-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/3016-155-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/3016-154-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/3016-151-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4768-175-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/4768-182-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4768-180-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4768-177-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4940-147-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4940-156-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/4940-149-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/4940-159-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/5020-138-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5020-136-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5020-132-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/5020-137-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5020-133-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5020-142-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/5096-173-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/5096-176-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5096-178-0x0000000010000000-0x0000000010362000-memory.dmp

      Filesize

      3.4MB

    • memory/5096-179-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB