Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2022, 01:32
Static task
static1
General
-
Target
0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe
-
Size
375KB
-
MD5
6c9e4d8fd012de8a3cbccb0830b1c248
-
SHA1
bdc474687e59bb08f5dda5453d1c37a075fb7e1b
-
SHA256
0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970
-
SHA512
a198ec3196e92980f71106baa860588bb72ace77a5ea689565f5bae0f0326ab69681568b9c3846f8db02be5ab431f42c94d3cf4c6bb9caf2943e167de5f6a18c
-
SSDEEP
6144:0v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:04VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral1/memory/800-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/800-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/800-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1248-146-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3208-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3208-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1248-156-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3208-158-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4276-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4448-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3208-179-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4448-180-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 1248 SQLSerasi.exe 3208 SQLSerasi.exe 4448 SQLSerasi.exe 4276 SQLSerasi.exe -
resource yara_rule behavioral1/memory/800-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/800-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/800-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/800-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1248-146-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3208-151-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3208-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3208-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1248-156-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3208-158-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4276-177-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4448-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3208-179-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4448-180-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4108 3208 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 800 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe Token: SeDebugPrivilege 1248 SQLSerasi.exe Token: SeDebugPrivilege 3208 SQLSerasi.exe Token: SeDebugPrivilege 3208 SQLSerasi.exe Token: SeDebugPrivilege 3208 SQLSerasi.exe Token: SeDebugPrivilege 4448 SQLSerasi.exe Token: SeDebugPrivilege 4276 SQLSerasi.exe Token: SeDebugPrivilege 4448 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 800 wrote to memory of 1248 800 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe 82 PID 800 wrote to memory of 1248 800 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe 82 PID 800 wrote to memory of 1248 800 0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe 82 PID 3208 wrote to memory of 4448 3208 SQLSerasi.exe 84 PID 3208 wrote to memory of 4448 3208 SQLSerasi.exe 84 PID 3208 wrote to memory of 4448 3208 SQLSerasi.exe 84 PID 3208 wrote to memory of 4276 3208 SQLSerasi.exe 86 PID 3208 wrote to memory of 4276 3208 SQLSerasi.exe 86 PID 3208 wrote to memory of 4276 3208 SQLSerasi.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe"C:\Users\Admin\AppData\Local\Temp\0f2c3d59bcd2118d60be5467886617363d8d68397c4dabeee6513c9a89658970.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 6602⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3208 -ip 32081⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5879e0e5f93ec6e3718985b2478ba5f21
SHA16eab78a9990f361ea69f5ef8a419f09821dba770
SHA25671574f85b58d422ff31f4f736276b50b62c08d305f664fa3b608c5e77244d6ba
SHA512475a21045ea015491be3d780ebe7638d4eb933e12a6f26a1c1846c592de36473637d83edaac226fb541c48d7d8813d9bedcf8c2c524e94282f6c0780f4c75ca2
-
Filesize
39.4MB
MD5879e0e5f93ec6e3718985b2478ba5f21
SHA16eab78a9990f361ea69f5ef8a419f09821dba770
SHA25671574f85b58d422ff31f4f736276b50b62c08d305f664fa3b608c5e77244d6ba
SHA512475a21045ea015491be3d780ebe7638d4eb933e12a6f26a1c1846c592de36473637d83edaac226fb541c48d7d8813d9bedcf8c2c524e94282f6c0780f4c75ca2
-
Filesize
39.4MB
MD5879e0e5f93ec6e3718985b2478ba5f21
SHA16eab78a9990f361ea69f5ef8a419f09821dba770
SHA25671574f85b58d422ff31f4f736276b50b62c08d305f664fa3b608c5e77244d6ba
SHA512475a21045ea015491be3d780ebe7638d4eb933e12a6f26a1c1846c592de36473637d83edaac226fb541c48d7d8813d9bedcf8c2c524e94282f6c0780f4c75ca2
-
Filesize
39.4MB
MD5879e0e5f93ec6e3718985b2478ba5f21
SHA16eab78a9990f361ea69f5ef8a419f09821dba770
SHA25671574f85b58d422ff31f4f736276b50b62c08d305f664fa3b608c5e77244d6ba
SHA512475a21045ea015491be3d780ebe7638d4eb933e12a6f26a1c1846c592de36473637d83edaac226fb541c48d7d8813d9bedcf8c2c524e94282f6c0780f4c75ca2
-
Filesize
39.4MB
MD5879e0e5f93ec6e3718985b2478ba5f21
SHA16eab78a9990f361ea69f5ef8a419f09821dba770
SHA25671574f85b58d422ff31f4f736276b50b62c08d305f664fa3b608c5e77244d6ba
SHA512475a21045ea015491be3d780ebe7638d4eb933e12a6f26a1c1846c592de36473637d83edaac226fb541c48d7d8813d9bedcf8c2c524e94282f6c0780f4c75ca2