Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2022, 09:40
Static task
static1
General
-
Target
8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe
-
Size
375KB
-
MD5
27143bc43f0b51fd73f09f5e720f737b
-
SHA1
b47bf6e106c7c4b125cb6b6f910bf1992d8f9ec4
-
SHA256
8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6
-
SHA512
d6864e21a8c1bd0563e0ffb58072d16699ea58e18f490d11ed2b2caa32259c00b83fc73be516464b7fef7e01f4c866e4a72fb23a4f87b114106b951cc3795383
-
SSDEEP
6144:/v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:/4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/3048-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2348-256-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4780-298-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4780-300-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4208-358-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4780-370-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4208-372-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 2348 SQLSerasi.exe 4780 SQLSerasi.exe 4208 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3048-167-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2348-256-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4780-298-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4780-300-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4208-358-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4780-370-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4208-372-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3048 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe Token: SeDebugPrivilege 2348 SQLSerasi.exe Token: SeDebugPrivilege 4780 SQLSerasi.exe Token: SeDebugPrivilege 4780 SQLSerasi.exe Token: SeDebugPrivilege 4208 SQLSerasi.exe Token: SeDebugPrivilege 4208 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2348 3048 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe 66 PID 3048 wrote to memory of 2348 3048 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe 66 PID 3048 wrote to memory of 2348 3048 8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe 66 PID 4780 wrote to memory of 4208 4780 SQLSerasi.exe 68 PID 4780 wrote to memory of 4208 4780 SQLSerasi.exe 68 PID 4780 wrote to memory of 4208 4780 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe"C:\Users\Admin\AppData\Local\Temp\8519d4df191de410790bf645b0feff83a6d236452865b112e9bd7feb2268dfa6.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5d60821ac8c10da8f7079e6c3741a4c23
SHA10e1f38140a657ba8d17210be63c078f2fb6cfab6
SHA256c918bdd603595eecf3f103e25514e6008519cb10a94102cc02a60dcac8b8ba68
SHA512790157c0ede3ea24aad65187d7c96c393c559726d7c61576363fa4f56f73a3289c5c8b93e052a8f4e492f8e6e07f1d265b13a7a332f8c77dffb0c0d2b0112a78
-
Filesize
39.4MB
MD5d60821ac8c10da8f7079e6c3741a4c23
SHA10e1f38140a657ba8d17210be63c078f2fb6cfab6
SHA256c918bdd603595eecf3f103e25514e6008519cb10a94102cc02a60dcac8b8ba68
SHA512790157c0ede3ea24aad65187d7c96c393c559726d7c61576363fa4f56f73a3289c5c8b93e052a8f4e492f8e6e07f1d265b13a7a332f8c77dffb0c0d2b0112a78
-
Filesize
39.4MB
MD5d60821ac8c10da8f7079e6c3741a4c23
SHA10e1f38140a657ba8d17210be63c078f2fb6cfab6
SHA256c918bdd603595eecf3f103e25514e6008519cb10a94102cc02a60dcac8b8ba68
SHA512790157c0ede3ea24aad65187d7c96c393c559726d7c61576363fa4f56f73a3289c5c8b93e052a8f4e492f8e6e07f1d265b13a7a332f8c77dffb0c0d2b0112a78
-
Filesize
39.4MB
MD5d60821ac8c10da8f7079e6c3741a4c23
SHA10e1f38140a657ba8d17210be63c078f2fb6cfab6
SHA256c918bdd603595eecf3f103e25514e6008519cb10a94102cc02a60dcac8b8ba68
SHA512790157c0ede3ea24aad65187d7c96c393c559726d7c61576363fa4f56f73a3289c5c8b93e052a8f4e492f8e6e07f1d265b13a7a332f8c77dffb0c0d2b0112a78