Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
28-09-2022 21:10
Static task
static1
General
-
Target
7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe
-
Size
375KB
-
MD5
6e88129acc7327239b2af89f38f6b695
-
SHA1
00d379002a2c4518ac53c66aaeae71d2adeb6b96
-
SHA256
7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745
-
SHA512
ab7335deeeed17ce55524143245bc1d9845e718c9e109cdf873f7187ed4c04bf80014843f7049c938cb66e7f36b8a16c28e43b14499830d6318319c0c12ab3cc
-
SSDEEP
6144:Xv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:X4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2744-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2744-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2744-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2744-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3420-252-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4988-301-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4988-305-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4964-361-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4964-363-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3420 SQLSerasi.exe 4988 SQLSerasi.exe 4964 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2744-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2744-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2744-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2744-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2744-178-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3420-252-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4988-301-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4988-305-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4964-361-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4964-363-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2744 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe Token: SeDebugPrivilege 3420 SQLSerasi.exe Token: SeDebugPrivilege 4988 SQLSerasi.exe Token: SeDebugPrivilege 4988 SQLSerasi.exe Token: SeDebugPrivilege 4964 SQLSerasi.exe Token: SeDebugPrivilege 4964 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3420 2744 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe 66 PID 2744 wrote to memory of 3420 2744 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe 66 PID 2744 wrote to memory of 3420 2744 7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe 66 PID 4988 wrote to memory of 4964 4988 SQLSerasi.exe 68 PID 4988 wrote to memory of 4964 4988 SQLSerasi.exe 68 PID 4988 wrote to memory of 4964 4988 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe"C:\Users\Admin\AppData\Local\Temp\7723b5366dbb1cc1b938b40ae92e0358606f9b2ecdbc6fafb293122321dd6745.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD59836eeef4dccaf0c23f00e4c7b17646a
SHA1c1a15d06420be7871b3a0281955e91384e951224
SHA2563bc997f7d3ee6163f8e95eb0c2a5a8d96dbaa8902fa44640f9d40b3a55fc3d91
SHA51293c06bb12673a362d3779a5564d46192479b3c61453f1a0f995f9c89f9fc19deaa6ae50476918f899ea8aeeeeb4c4f4eb502894644f36dfa6a47b1ef00d36e24
-
Filesize
39.4MB
MD59836eeef4dccaf0c23f00e4c7b17646a
SHA1c1a15d06420be7871b3a0281955e91384e951224
SHA2563bc997f7d3ee6163f8e95eb0c2a5a8d96dbaa8902fa44640f9d40b3a55fc3d91
SHA51293c06bb12673a362d3779a5564d46192479b3c61453f1a0f995f9c89f9fc19deaa6ae50476918f899ea8aeeeeb4c4f4eb502894644f36dfa6a47b1ef00d36e24
-
Filesize
39.4MB
MD59836eeef4dccaf0c23f00e4c7b17646a
SHA1c1a15d06420be7871b3a0281955e91384e951224
SHA2563bc997f7d3ee6163f8e95eb0c2a5a8d96dbaa8902fa44640f9d40b3a55fc3d91
SHA51293c06bb12673a362d3779a5564d46192479b3c61453f1a0f995f9c89f9fc19deaa6ae50476918f899ea8aeeeeb4c4f4eb502894644f36dfa6a47b1ef00d36e24
-
Filesize
39.4MB
MD59836eeef4dccaf0c23f00e4c7b17646a
SHA1c1a15d06420be7871b3a0281955e91384e951224
SHA2563bc997f7d3ee6163f8e95eb0c2a5a8d96dbaa8902fa44640f9d40b3a55fc3d91
SHA51293c06bb12673a362d3779a5564d46192479b3c61453f1a0f995f9c89f9fc19deaa6ae50476918f899ea8aeeeeb4c4f4eb502894644f36dfa6a47b1ef00d36e24