Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 19:00
Static task
static1
General
-
Target
a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe
-
Size
375KB
-
MD5
aa686d8290261376e6cef65e9187bccb
-
SHA1
9141007472c3948b790adfc1811a9c892beea950
-
SHA256
a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a
-
SHA512
46c7e3ed3b277dec3ce4ac2c7f0f134e6f9aa5164d3322259cf317170f60c58fbb2467e06f3f89e8d9116b5d7ed2c8bb3b248d7a50eb0c102df0005fecce0d7b
-
SSDEEP
6144:Sv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:S4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/4368-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4368-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4368-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4368-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2944-247-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4564-298-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3100-357-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3100-366-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4564-370-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 2944 SQLSerasi.exe 4564 SQLSerasi.exe 3100 SQLSerasi.exe -
resource yara_rule behavioral1/memory/4368-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4368-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4368-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4368-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4368-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2944-247-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4564-298-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3100-357-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3100-366-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4564-370-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4368 a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe Token: SeDebugPrivilege 2944 SQLSerasi.exe Token: SeDebugPrivilege 4564 SQLSerasi.exe Token: SeDebugPrivilege 4564 SQLSerasi.exe Token: SeDebugPrivilege 3100 SQLSerasi.exe Token: SeDebugPrivilege 3100 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2944 4368 a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe 67 PID 4368 wrote to memory of 2944 4368 a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe 67 PID 4368 wrote to memory of 2944 4368 a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe 67 PID 4564 wrote to memory of 3100 4564 SQLSerasi.exe 69 PID 4564 wrote to memory of 3100 4564 SQLSerasi.exe 69 PID 4564 wrote to memory of 3100 4564 SQLSerasi.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe"C:\Users\Admin\AppData\Local\Temp\a62e29d291617c2fe56bb602880f398acb546456912428e4c493f3122f6f5b1a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5494e46cbe86c461c408fbda8a35e8981
SHA16e8e0a75a30df10da621066cbb9c33ca27685df7
SHA256fcf37b62592534aadc1b268cafa336b817f0fb55b1d5e315a246d1a89675da44
SHA512db976e6c5c79dffd60d1ab88357d85aa059b15c57827c52d35f5656018f11bdcb8ef0ef3640ddb8e9ef714ef5970aee7deba7781ad630759600a6d5006901b1b
-
Filesize
39.4MB
MD5494e46cbe86c461c408fbda8a35e8981
SHA16e8e0a75a30df10da621066cbb9c33ca27685df7
SHA256fcf37b62592534aadc1b268cafa336b817f0fb55b1d5e315a246d1a89675da44
SHA512db976e6c5c79dffd60d1ab88357d85aa059b15c57827c52d35f5656018f11bdcb8ef0ef3640ddb8e9ef714ef5970aee7deba7781ad630759600a6d5006901b1b
-
Filesize
39.4MB
MD5494e46cbe86c461c408fbda8a35e8981
SHA16e8e0a75a30df10da621066cbb9c33ca27685df7
SHA256fcf37b62592534aadc1b268cafa336b817f0fb55b1d5e315a246d1a89675da44
SHA512db976e6c5c79dffd60d1ab88357d85aa059b15c57827c52d35f5656018f11bdcb8ef0ef3640ddb8e9ef714ef5970aee7deba7781ad630759600a6d5006901b1b
-
Filesize
39.4MB
MD5494e46cbe86c461c408fbda8a35e8981
SHA16e8e0a75a30df10da621066cbb9c33ca27685df7
SHA256fcf37b62592534aadc1b268cafa336b817f0fb55b1d5e315a246d1a89675da44
SHA512db976e6c5c79dffd60d1ab88357d85aa059b15c57827c52d35f5656018f11bdcb8ef0ef3640ddb8e9ef714ef5970aee7deba7781ad630759600a6d5006901b1b