Analysis
-
max time kernel
155s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 22:43
Static task
static1
General
-
Target
d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe
-
Size
375KB
-
MD5
ca2db4af99b8c1fc9d2b8c7642daa1b1
-
SHA1
a262bf0ab9cf37c931ebd7ed4b3e4faf0d349108
-
SHA256
d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90
-
SHA512
da8be6da3034524f556a9a93de23b47520dcc966648a2158639fc4e92d9fee9c5eebf94f58dd7615c53ad2821ba2acd95f88a663b06418b818b282e90e5b6ebc
-
SSDEEP
6144:Xv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:X4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/3700-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3700-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3700-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/808-152-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/808-153-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3412-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/808-159-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1644-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/420-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/420-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 3412 SQLSerasi.exe 808 SQLSerasi.exe 420 SQLSerasi.exe 1644 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3700-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3700-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3700-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3700-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/808-149-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/808-152-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/808-153-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3412-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/808-159-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1644-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/420-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/420-177-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4864 808 WerFault.exe 80 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3700 d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe Token: SeDebugPrivilege 3412 SQLSerasi.exe Token: SeDebugPrivilege 808 SQLSerasi.exe Token: SeDebugPrivilege 808 SQLSerasi.exe Token: SeDebugPrivilege 808 SQLSerasi.exe Token: SeDebugPrivilege 420 SQLSerasi.exe Token: SeDebugPrivilege 1644 SQLSerasi.exe Token: SeDebugPrivilege 420 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3412 3700 d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe 79 PID 3700 wrote to memory of 3412 3700 d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe 79 PID 3700 wrote to memory of 3412 3700 d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe 79 PID 808 wrote to memory of 420 808 SQLSerasi.exe 85 PID 808 wrote to memory of 420 808 SQLSerasi.exe 85 PID 808 wrote to memory of 420 808 SQLSerasi.exe 85 PID 808 wrote to memory of 1644 808 SQLSerasi.exe 84 PID 808 wrote to memory of 1644 808 SQLSerasi.exe 84 PID 808 wrote to memory of 1644 808 SQLSerasi.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe"C:\Users\Admin\AppData\Local\Temp\d13cd3de3128d0a1baefe6f701cf49f9cc144c7da249db64d6a5cbb9af9bea90.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 5722⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 808 -ip 8081⤵PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD55927e40b49d97634d300fa07d98a6b61
SHA11d378426f2c3fbb92edf3629b6588925ba8056ad
SHA2565fdcdc5854cc337ace2958f67f7a2c43443ef93d4c38a0e4ad193239ba5a7c41
SHA512cb542a21a7dd658cf7123ad94b3369b96d071a2a52508a4e0187e72c7ac12c10aa1e2e355f823af8f4364f92281631d902df2f78750ad42c73220f3bdea124b5
-
Filesize
39.4MB
MD55927e40b49d97634d300fa07d98a6b61
SHA11d378426f2c3fbb92edf3629b6588925ba8056ad
SHA2565fdcdc5854cc337ace2958f67f7a2c43443ef93d4c38a0e4ad193239ba5a7c41
SHA512cb542a21a7dd658cf7123ad94b3369b96d071a2a52508a4e0187e72c7ac12c10aa1e2e355f823af8f4364f92281631d902df2f78750ad42c73220f3bdea124b5
-
Filesize
39.4MB
MD55927e40b49d97634d300fa07d98a6b61
SHA11d378426f2c3fbb92edf3629b6588925ba8056ad
SHA2565fdcdc5854cc337ace2958f67f7a2c43443ef93d4c38a0e4ad193239ba5a7c41
SHA512cb542a21a7dd658cf7123ad94b3369b96d071a2a52508a4e0187e72c7ac12c10aa1e2e355f823af8f4364f92281631d902df2f78750ad42c73220f3bdea124b5
-
Filesize
39.4MB
MD55927e40b49d97634d300fa07d98a6b61
SHA11d378426f2c3fbb92edf3629b6588925ba8056ad
SHA2565fdcdc5854cc337ace2958f67f7a2c43443ef93d4c38a0e4ad193239ba5a7c41
SHA512cb542a21a7dd658cf7123ad94b3369b96d071a2a52508a4e0187e72c7ac12c10aa1e2e355f823af8f4364f92281631d902df2f78750ad42c73220f3bdea124b5
-
Filesize
39.4MB
MD55927e40b49d97634d300fa07d98a6b61
SHA11d378426f2c3fbb92edf3629b6588925ba8056ad
SHA2565fdcdc5854cc337ace2958f67f7a2c43443ef93d4c38a0e4ad193239ba5a7c41
SHA512cb542a21a7dd658cf7123ad94b3369b96d071a2a52508a4e0187e72c7ac12c10aa1e2e355f823af8f4364f92281631d902df2f78750ad42c73220f3bdea124b5