Analysis
-
max time kernel
176s -
max time network
189s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/10/2022, 09:29
Static task
static1
General
-
Target
a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe
-
Size
375KB
-
MD5
8d658de6800b1d4ea61bbabaf9eeb9c2
-
SHA1
5e2951aec8ac285d89e1e303dc26d1d5d2deb893
-
SHA256
a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68
-
SHA512
140abab0d757ce8b5bd9ff3dc5d8c91e1297c2fe166295fbf0a229af8a6f6f9ed5e94f38081ee21ea34169ed8c677e7413b4f836c4d62a3f57c3d1fc6a4b1e3e
-
SSDEEP
6144:9v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:94VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2668-169-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2668-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2668-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4680-254-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5104-296-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/5104-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1232-355-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1232-358-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4680 SQLSerasi.exe 5104 SQLSerasi.exe 1232 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2668-165-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2668-169-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2668-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2668-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4680-254-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5104-296-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/5104-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1232-355-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1232-358-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2668 a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe Token: SeDebugPrivilege 4680 SQLSerasi.exe Token: SeDebugPrivilege 5104 SQLSerasi.exe Token: SeDebugPrivilege 5104 SQLSerasi.exe Token: SeDebugPrivilege 1232 SQLSerasi.exe Token: SeDebugPrivilege 1232 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2668 wrote to memory of 4680 2668 a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe 66 PID 2668 wrote to memory of 4680 2668 a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe 66 PID 2668 wrote to memory of 4680 2668 a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe 66 PID 5104 wrote to memory of 1232 5104 SQLSerasi.exe 68 PID 5104 wrote to memory of 1232 5104 SQLSerasi.exe 68 PID 5104 wrote to memory of 1232 5104 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe"C:\Users\Admin\AppData\Local\Temp\a5660848d151618aee871c98262fa0939db55d448435a6107eae1bbb60848e68.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5346d738843ba07706d1381f0da55992e
SHA1e7d754f2d907ff58fb95208613d65c12e3aa3492
SHA256d5f5b7bd74e933442627554d3718254d7a22647a0b925f5eb1d331efc438a4b0
SHA51250038a95bed29decd849e68776bc06f7aa87b4d865266ce44d3efe1931be0d477fb4d48968cce10c4f77eb577fa9a6afcb1f306097021c55c0f8fb8c9b3b51a2
-
Filesize
39.4MB
MD5346d738843ba07706d1381f0da55992e
SHA1e7d754f2d907ff58fb95208613d65c12e3aa3492
SHA256d5f5b7bd74e933442627554d3718254d7a22647a0b925f5eb1d331efc438a4b0
SHA51250038a95bed29decd849e68776bc06f7aa87b4d865266ce44d3efe1931be0d477fb4d48968cce10c4f77eb577fa9a6afcb1f306097021c55c0f8fb8c9b3b51a2
-
Filesize
39.4MB
MD5346d738843ba07706d1381f0da55992e
SHA1e7d754f2d907ff58fb95208613d65c12e3aa3492
SHA256d5f5b7bd74e933442627554d3718254d7a22647a0b925f5eb1d331efc438a4b0
SHA51250038a95bed29decd849e68776bc06f7aa87b4d865266ce44d3efe1931be0d477fb4d48968cce10c4f77eb577fa9a6afcb1f306097021c55c0f8fb8c9b3b51a2
-
Filesize
39.4MB
MD5346d738843ba07706d1381f0da55992e
SHA1e7d754f2d907ff58fb95208613d65c12e3aa3492
SHA256d5f5b7bd74e933442627554d3718254d7a22647a0b925f5eb1d331efc438a4b0
SHA51250038a95bed29decd849e68776bc06f7aa87b4d865266ce44d3efe1931be0d477fb4d48968cce10c4f77eb577fa9a6afcb1f306097021c55c0f8fb8c9b3b51a2