Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 13:48
Static task
static1
General
-
Target
5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe
-
Size
375KB
-
MD5
5a6a03bea135dd3a006342f6b8b4bd07
-
SHA1
8b967007a8e55488df9d985c5554a466275e284d
-
SHA256
5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1
-
SHA512
3a127d8d787c7a8b63d5b4b5535838c2796d8eb32e3bf8eae8486177436fb81fa72605369983b404ef1d538861c1c4926b180329c2f6dc4ce81595c788d7bcc6
-
SSDEEP
6144:Ev5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:E4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/2796-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2796-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2796-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2796-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4268-247-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4268-259-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3832-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3832-307-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4304-362-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4304-375-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4268 SQLSerasi.exe 3832 SQLSerasi.exe 4304 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2796-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2796-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2796-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2796-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2796-178-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4268-247-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4268-259-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3832-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3832-307-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4304-362-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4304-375-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2796 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe Token: SeDebugPrivilege 4268 SQLSerasi.exe Token: SeDebugPrivilege 3832 SQLSerasi.exe Token: SeDebugPrivilege 3832 SQLSerasi.exe Token: SeDebugPrivilege 4304 SQLSerasi.exe Token: SeDebugPrivilege 4304 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4268 2796 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe 66 PID 2796 wrote to memory of 4268 2796 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe 66 PID 2796 wrote to memory of 4268 2796 5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe 66 PID 3832 wrote to memory of 4304 3832 SQLSerasi.exe 68 PID 3832 wrote to memory of 4304 3832 SQLSerasi.exe 68 PID 3832 wrote to memory of 4304 3832 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe"C:\Users\Admin\AppData\Local\Temp\5d6194c095d3c8899ce6d54415c3670942306690efc3ae71cf06ee2c1f5e4cc1.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD57d5b5ef1c8d14e68a90e47b5b1a4ee8e
SHA13466489950d6acf38719cea7aec94e75a8ef7717
SHA256ff6ccb1b3ee244e75e79ee4602c364d78bca1abf74cb53d8e1320cc96e6bb9ad
SHA512eb972630c281524d067dd03eee93856ee0a89c8a3491a9a11cb8bbaafe37827fb89f1a4814a5a431bd80579ab92e0708de06125cf3b317255b566f647b434e93
-
Filesize
39.4MB
MD57d5b5ef1c8d14e68a90e47b5b1a4ee8e
SHA13466489950d6acf38719cea7aec94e75a8ef7717
SHA256ff6ccb1b3ee244e75e79ee4602c364d78bca1abf74cb53d8e1320cc96e6bb9ad
SHA512eb972630c281524d067dd03eee93856ee0a89c8a3491a9a11cb8bbaafe37827fb89f1a4814a5a431bd80579ab92e0708de06125cf3b317255b566f647b434e93
-
Filesize
39.4MB
MD57d5b5ef1c8d14e68a90e47b5b1a4ee8e
SHA13466489950d6acf38719cea7aec94e75a8ef7717
SHA256ff6ccb1b3ee244e75e79ee4602c364d78bca1abf74cb53d8e1320cc96e6bb9ad
SHA512eb972630c281524d067dd03eee93856ee0a89c8a3491a9a11cb8bbaafe37827fb89f1a4814a5a431bd80579ab92e0708de06125cf3b317255b566f647b434e93
-
Filesize
39.4MB
MD57d5b5ef1c8d14e68a90e47b5b1a4ee8e
SHA13466489950d6acf38719cea7aec94e75a8ef7717
SHA256ff6ccb1b3ee244e75e79ee4602c364d78bca1abf74cb53d8e1320cc96e6bb9ad
SHA512eb972630c281524d067dd03eee93856ee0a89c8a3491a9a11cb8bbaafe37827fb89f1a4814a5a431bd80579ab92e0708de06125cf3b317255b566f647b434e93