Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2022, 21:38
Static task
static1
General
-
Target
326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe
-
Size
375KB
-
MD5
cfd1fd4ca9b32c1523ebba280d85d978
-
SHA1
8791b2a74fd4d6c4b1cd85ad8a8c35637c19e132
-
SHA256
326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad
-
SHA512
414991e03251a02868a6ff09641d43d5cdc75ee2a98547b16af34b272ad6049e0d2991885bfcd667bafe5bfb97ee0496defe6813635596b1309d128cfb36c270
-
SSDEEP
6144:5v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:54VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/444-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/444-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/444-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3104-152-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1960-153-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3104-157-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3104-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3104-160-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4904-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4888-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 1960 SQLSerasi.exe 3104 SQLSerasi.exe 4904 SQLSerasi.exe 4888 SQLSerasi.exe -
resource yara_rule behavioral1/memory/444-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/444-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/444-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/444-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3104-149-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3104-152-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1960-153-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3104-157-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3104-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3104-160-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4904-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4888-177-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3412 3104 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 444 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe Token: SeDebugPrivilege 1960 SQLSerasi.exe Token: SeDebugPrivilege 3104 SQLSerasi.exe Token: SeDebugPrivilege 3104 SQLSerasi.exe Token: SeDebugPrivilege 3104 SQLSerasi.exe Token: SeDebugPrivilege 4904 SQLSerasi.exe Token: SeDebugPrivilege 4888 SQLSerasi.exe Token: SeDebugPrivilege 4904 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 444 wrote to memory of 1960 444 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe 80 PID 444 wrote to memory of 1960 444 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe 80 PID 444 wrote to memory of 1960 444 326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe 80 PID 3104 wrote to memory of 4904 3104 SQLSerasi.exe 82 PID 3104 wrote to memory of 4904 3104 SQLSerasi.exe 82 PID 3104 wrote to memory of 4904 3104 SQLSerasi.exe 82 PID 3104 wrote to memory of 4888 3104 SQLSerasi.exe 83 PID 3104 wrote to memory of 4888 3104 SQLSerasi.exe 83 PID 3104 wrote to memory of 4888 3104 SQLSerasi.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe"C:\Users\Admin\AppData\Local\Temp\326334e4a3df7e38d48fd3366c6346725db8a7ee5fc84ed5dd4b482030ec59ad.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 6442⤵
- Program crash
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3104 -ip 31041⤵PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5ba6e2f3cefbaa1be4254dd1fae35b03f
SHA1fcf52533e5a40c5e7f1262ae0fd078156ece0fb2
SHA2566358ab24a17f2e7d8855bf28c628b04c14160ab1c876f34a57f22e822094ac6a
SHA5129d36d0e22779dc0832d3004f9f4eb2306c8622ed966c62f04b78929858000410508643bec24e466075b509a8c4543f2c110be96be480c9dba8b02f4dd8bb94cc
-
Filesize
39.4MB
MD5ba6e2f3cefbaa1be4254dd1fae35b03f
SHA1fcf52533e5a40c5e7f1262ae0fd078156ece0fb2
SHA2566358ab24a17f2e7d8855bf28c628b04c14160ab1c876f34a57f22e822094ac6a
SHA5129d36d0e22779dc0832d3004f9f4eb2306c8622ed966c62f04b78929858000410508643bec24e466075b509a8c4543f2c110be96be480c9dba8b02f4dd8bb94cc
-
Filesize
39.4MB
MD5ba6e2f3cefbaa1be4254dd1fae35b03f
SHA1fcf52533e5a40c5e7f1262ae0fd078156ece0fb2
SHA2566358ab24a17f2e7d8855bf28c628b04c14160ab1c876f34a57f22e822094ac6a
SHA5129d36d0e22779dc0832d3004f9f4eb2306c8622ed966c62f04b78929858000410508643bec24e466075b509a8c4543f2c110be96be480c9dba8b02f4dd8bb94cc
-
Filesize
39.4MB
MD5ba6e2f3cefbaa1be4254dd1fae35b03f
SHA1fcf52533e5a40c5e7f1262ae0fd078156ece0fb2
SHA2566358ab24a17f2e7d8855bf28c628b04c14160ab1c876f34a57f22e822094ac6a
SHA5129d36d0e22779dc0832d3004f9f4eb2306c8622ed966c62f04b78929858000410508643bec24e466075b509a8c4543f2c110be96be480c9dba8b02f4dd8bb94cc
-
Filesize
39.4MB
MD5ba6e2f3cefbaa1be4254dd1fae35b03f
SHA1fcf52533e5a40c5e7f1262ae0fd078156ece0fb2
SHA2566358ab24a17f2e7d8855bf28c628b04c14160ab1c876f34a57f22e822094ac6a
SHA5129d36d0e22779dc0832d3004f9f4eb2306c8622ed966c62f04b78929858000410508643bec24e466075b509a8c4543f2c110be96be480c9dba8b02f4dd8bb94cc