Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2022, 20:08
Static task
static1
General
-
Target
709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe
-
Size
375KB
-
MD5
39574f2602507138379b46caaa0a1f77
-
SHA1
2ee9e1dda9731833b79ded80c737d2d86332ae7e
-
SHA256
709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56
-
SHA512
27f71798686f91eba421b30a26babdcc446aa6128c6cc9355829a4b6b0a13c5a408a30ea6b83d0cb14fa46f7abed7770d9a7e73c31b98349bde2b5c2bf66f24b
-
SSDEEP
6144:/v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:/4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2956-261-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2216-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4804-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2216-369-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 2956 SQLSerasi.exe 2216 SQLSerasi.exe 4804 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3048-167-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2956-261-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2216-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4804-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2216-369-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3048 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe Token: SeDebugPrivilege 2956 SQLSerasi.exe Token: SeDebugPrivilege 2216 SQLSerasi.exe Token: SeDebugPrivilege 2216 SQLSerasi.exe Token: SeDebugPrivilege 4804 SQLSerasi.exe Token: SeDebugPrivilege 4804 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2956 3048 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe 66 PID 3048 wrote to memory of 2956 3048 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe 66 PID 3048 wrote to memory of 2956 3048 709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe 66 PID 2216 wrote to memory of 4804 2216 SQLSerasi.exe 68 PID 2216 wrote to memory of 4804 2216 SQLSerasi.exe 68 PID 2216 wrote to memory of 4804 2216 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe"C:\Users\Admin\AppData\Local\Temp\709280a87b4abc2326dd99693496ed9efd3c91aeb26540f3e93f454ac8a6be56.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5653020c5647e9b30ab5a920d56301e2d
SHA1b34dcdff998465d50bdc6b6f438baa1c875f01a8
SHA256e4aa3a050ee3efddb1a4ea4e27140ccece538e065250c194696f67763be1c0a0
SHA5122c582a159968577863e5c70f95255a37894454dfa05b0d0a79c39b5e22d1170cc20ddf170a5a35d76c9fc6f5f08132a92f84abba61fb514e802306dbac732c1a
-
Filesize
39.4MB
MD5653020c5647e9b30ab5a920d56301e2d
SHA1b34dcdff998465d50bdc6b6f438baa1c875f01a8
SHA256e4aa3a050ee3efddb1a4ea4e27140ccece538e065250c194696f67763be1c0a0
SHA5122c582a159968577863e5c70f95255a37894454dfa05b0d0a79c39b5e22d1170cc20ddf170a5a35d76c9fc6f5f08132a92f84abba61fb514e802306dbac732c1a
-
Filesize
39.4MB
MD5653020c5647e9b30ab5a920d56301e2d
SHA1b34dcdff998465d50bdc6b6f438baa1c875f01a8
SHA256e4aa3a050ee3efddb1a4ea4e27140ccece538e065250c194696f67763be1c0a0
SHA5122c582a159968577863e5c70f95255a37894454dfa05b0d0a79c39b5e22d1170cc20ddf170a5a35d76c9fc6f5f08132a92f84abba61fb514e802306dbac732c1a
-
Filesize
39.4MB
MD5653020c5647e9b30ab5a920d56301e2d
SHA1b34dcdff998465d50bdc6b6f438baa1c875f01a8
SHA256e4aa3a050ee3efddb1a4ea4e27140ccece538e065250c194696f67763be1c0a0
SHA5122c582a159968577863e5c70f95255a37894454dfa05b0d0a79c39b5e22d1170cc20ddf170a5a35d76c9fc6f5f08132a92f84abba61fb514e802306dbac732c1a