Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2022, 20:57
Static task
static1
General
-
Target
8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe
-
Size
375KB
-
MD5
4a2f1bed70e52a773c6473a07e4b080b
-
SHA1
2f87a792d0042383c7c1a7ff6304afe7f33e471c
-
SHA256
8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9
-
SHA512
43a02d84c8f545e78f1fb0ae306f45b5eac8aa08c3b9bd40b3b23f535d60741b182a366c4aaef7a18e8ec94939977fef603d65302c215df613a1ef46a194e215
-
SSDEEP
6144:Ov5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:O4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 14 IoCs
resource yara_rule behavioral1/memory/5020-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5020-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5020-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4940-147-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3016-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3016-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4940-156-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3016-158-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5096-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4768-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5096-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4768-180-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3016-181-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4768-182-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 4940 SQLSerasi.exe 3016 SQLSerasi.exe 5096 SQLSerasi.exe 4768 SQLSerasi.exe -
resource yara_rule behavioral1/memory/5020-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5020-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5020-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5020-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4940-147-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3016-151-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3016-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3016-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4940-156-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3016-158-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5096-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4768-177-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5096-178-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4768-180-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3016-181-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4768-182-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4092 3016 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 5020 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe Token: SeDebugPrivilege 4940 SQLSerasi.exe Token: SeDebugPrivilege 3016 SQLSerasi.exe Token: SeDebugPrivilege 3016 SQLSerasi.exe Token: SeDebugPrivilege 3016 SQLSerasi.exe Token: SeDebugPrivilege 5096 SQLSerasi.exe Token: SeDebugPrivilege 4768 SQLSerasi.exe Token: SeDebugPrivilege 4768 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4940 5020 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe 80 PID 5020 wrote to memory of 4940 5020 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe 80 PID 5020 wrote to memory of 4940 5020 8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe 80 PID 3016 wrote to memory of 5096 3016 SQLSerasi.exe 82 PID 3016 wrote to memory of 5096 3016 SQLSerasi.exe 82 PID 3016 wrote to memory of 5096 3016 SQLSerasi.exe 82 PID 3016 wrote to memory of 4768 3016 SQLSerasi.exe 84 PID 3016 wrote to memory of 4768 3016 SQLSerasi.exe 84 PID 3016 wrote to memory of 4768 3016 SQLSerasi.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe"C:\Users\Admin\AppData\Local\Temp\8c8fce2cd1904725403896d6f1d1b3b3c5f4d1b610a39965e5723459385e86a9.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 6442⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3016 -ip 30161⤵PID:4236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD509f3badd8dba6799fc2ee96cfa2a702e
SHA1915d63bd56136009da772eb7b38593d1ae8841f5
SHA256e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223
SHA512bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575
-
Filesize
39.4MB
MD509f3badd8dba6799fc2ee96cfa2a702e
SHA1915d63bd56136009da772eb7b38593d1ae8841f5
SHA256e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223
SHA512bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575
-
Filesize
39.4MB
MD509f3badd8dba6799fc2ee96cfa2a702e
SHA1915d63bd56136009da772eb7b38593d1ae8841f5
SHA256e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223
SHA512bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575
-
Filesize
39.4MB
MD509f3badd8dba6799fc2ee96cfa2a702e
SHA1915d63bd56136009da772eb7b38593d1ae8841f5
SHA256e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223
SHA512bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575
-
Filesize
39.4MB
MD509f3badd8dba6799fc2ee96cfa2a702e
SHA1915d63bd56136009da772eb7b38593d1ae8841f5
SHA256e3f82dbd12eeb3d0593221b95b1bb8a54016b1afd2178fbd00e7b5becec24223
SHA512bf5006bd902a24224a3ae2ea5f7bd6ad127eef6e20237aa5edd83b3ba14bf078b82235b9af3487e9e1a89a400ad367d742fc22cee8a25b11f27a2be532812575