Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/09/2022, 15:20
Static task
static1
General
-
Target
5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe
-
Size
375KB
-
MD5
494f19f306f097359689bde71df99249
-
SHA1
4549d8e0639e480feec4406bc5df9b8ee87a535a
-
SHA256
5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287
-
SHA512
be2fe12c83809931bff65b15b5e22221529d6fe4fc15b590875c9ffa432d39beecc9b3522cc0526144b2fee255490c50b7f28d60eff7343f52df2b1ebefdedb0
-
SSDEEP
6144:9v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:94VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2700-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2700-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2700-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2700-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5092-242-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5092-268-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1688-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4732-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1688-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4732-371-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 5092 SQLSerasi.exe 1688 SQLSerasi.exe 4732 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2700-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2700-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2700-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2700-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2700-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5092-242-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5092-268-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1688-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4732-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1688-369-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4732-371-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2700 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe Token: SeDebugPrivilege 5092 SQLSerasi.exe Token: SeDebugPrivilege 1688 SQLSerasi.exe Token: SeDebugPrivilege 1688 SQLSerasi.exe Token: SeDebugPrivilege 4732 SQLSerasi.exe Token: SeDebugPrivilege 4732 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 5092 2700 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe 66 PID 2700 wrote to memory of 5092 2700 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe 66 PID 2700 wrote to memory of 5092 2700 5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe 66 PID 1688 wrote to memory of 4732 1688 SQLSerasi.exe 68 PID 1688 wrote to memory of 4732 1688 SQLSerasi.exe 68 PID 1688 wrote to memory of 4732 1688 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe"C:\Users\Admin\AppData\Local\Temp\5a4a7dd89a1dd606be1274ed8ac376f0c386b2010363134af29b1e856537c287.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5c2969d3e3563136ae61eb7ba6dc4dff9
SHA1d89fad7c11a6cff9306659515c41036f3b3fe4fd
SHA25636f075da717baf6e3698e42c53a94aabb04e6faf4707a6941d7f8d6bacb2d3db
SHA512c1a5952400575efcee8e42a1c2a183a6dbb2cb7bf5eb41462fc5166c3ea191ff9a4ac17a46d46715fa1615f11951be81d3cd8c7520be36f74475a2c040120951
-
Filesize
39.4MB
MD5c2969d3e3563136ae61eb7ba6dc4dff9
SHA1d89fad7c11a6cff9306659515c41036f3b3fe4fd
SHA25636f075da717baf6e3698e42c53a94aabb04e6faf4707a6941d7f8d6bacb2d3db
SHA512c1a5952400575efcee8e42a1c2a183a6dbb2cb7bf5eb41462fc5166c3ea191ff9a4ac17a46d46715fa1615f11951be81d3cd8c7520be36f74475a2c040120951
-
Filesize
39.4MB
MD5c2969d3e3563136ae61eb7ba6dc4dff9
SHA1d89fad7c11a6cff9306659515c41036f3b3fe4fd
SHA25636f075da717baf6e3698e42c53a94aabb04e6faf4707a6941d7f8d6bacb2d3db
SHA512c1a5952400575efcee8e42a1c2a183a6dbb2cb7bf5eb41462fc5166c3ea191ff9a4ac17a46d46715fa1615f11951be81d3cd8c7520be36f74475a2c040120951
-
Filesize
39.4MB
MD5c2969d3e3563136ae61eb7ba6dc4dff9
SHA1d89fad7c11a6cff9306659515c41036f3b3fe4fd
SHA25636f075da717baf6e3698e42c53a94aabb04e6faf4707a6941d7f8d6bacb2d3db
SHA512c1a5952400575efcee8e42a1c2a183a6dbb2cb7bf5eb41462fc5166c3ea191ff9a4ac17a46d46715fa1615f11951be81d3cd8c7520be36f74475a2c040120951