Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2022, 16:36
Static task
static1
General
-
Target
b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe
-
Size
375KB
-
MD5
61cb0e23aeb7925c7206f833655c017c
-
SHA1
61e69ff3d8e30bc81fbef5ff65785c3103890e4e
-
SHA256
b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733
-
SHA512
ab2b63a61eb739d53b12b908a8de6c0e40e20aec08b2b886b2028f3d555975c6308bf415830e892103364a7fa9c3e0dfd0c85497eac03ba82cce6f1e78a2aa73
-
SSDEEP
6144:Pv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:P4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/372-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/372-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/372-139-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/556-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/556-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/556-161-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3504-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4448-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 4448 SQLSerasi.exe 556 SQLSerasi.exe 3504 SQLSerasi.exe 4964 SQLSerasi.exe -
resource yara_rule behavioral1/memory/372-132-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/372-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/372-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/372-139-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/556-151-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/556-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/556-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/556-161-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3504-177-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1292 556 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 372 b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe Token: SeDebugPrivilege 4448 SQLSerasi.exe Token: SeDebugPrivilege 556 SQLSerasi.exe Token: SeDebugPrivilege 556 SQLSerasi.exe Token: SeDebugPrivilege 556 SQLSerasi.exe Token: SeDebugPrivilege 3504 SQLSerasi.exe Token: SeDebugPrivilege 4964 SQLSerasi.exe Token: SeDebugPrivilege 3504 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 372 wrote to memory of 4448 372 b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe 81 PID 372 wrote to memory of 4448 372 b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe 81 PID 372 wrote to memory of 4448 372 b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe 81 PID 556 wrote to memory of 3504 556 SQLSerasi.exe 85 PID 556 wrote to memory of 3504 556 SQLSerasi.exe 85 PID 556 wrote to memory of 3504 556 SQLSerasi.exe 85 PID 556 wrote to memory of 4964 556 SQLSerasi.exe 86 PID 556 wrote to memory of 4964 556 SQLSerasi.exe 86 PID 556 wrote to memory of 4964 556 SQLSerasi.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe"C:\Users\Admin\AppData\Local\Temp\b71c0b902245d760c242c68e00aa1d87c53c0a014660effce73396128cba9733.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 6682⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 556 -ip 5561⤵PID:3148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5c3c8df949b27c32fc5bb18c2477f60d6
SHA1e360fd6bfcd56aca90b35cf5c8ba4954de8b23b6
SHA2566df2ec3ac959098b15510f836527d529a3fcab5087fd95bf8d3f44893b0fc818
SHA512c9adb91678bb96003f6a00eaa0b6a08da0ed5789579e18e698a9e4d4e8b510ec1f0a5ae7b630b75e96e856e7d6c90b9c89f467feec4f3ec7250cf88d358506fe
-
Filesize
39.4MB
MD5c3c8df949b27c32fc5bb18c2477f60d6
SHA1e360fd6bfcd56aca90b35cf5c8ba4954de8b23b6
SHA2566df2ec3ac959098b15510f836527d529a3fcab5087fd95bf8d3f44893b0fc818
SHA512c9adb91678bb96003f6a00eaa0b6a08da0ed5789579e18e698a9e4d4e8b510ec1f0a5ae7b630b75e96e856e7d6c90b9c89f467feec4f3ec7250cf88d358506fe
-
Filesize
39.4MB
MD5c3c8df949b27c32fc5bb18c2477f60d6
SHA1e360fd6bfcd56aca90b35cf5c8ba4954de8b23b6
SHA2566df2ec3ac959098b15510f836527d529a3fcab5087fd95bf8d3f44893b0fc818
SHA512c9adb91678bb96003f6a00eaa0b6a08da0ed5789579e18e698a9e4d4e8b510ec1f0a5ae7b630b75e96e856e7d6c90b9c89f467feec4f3ec7250cf88d358506fe
-
Filesize
39.4MB
MD5c3c8df949b27c32fc5bb18c2477f60d6
SHA1e360fd6bfcd56aca90b35cf5c8ba4954de8b23b6
SHA2566df2ec3ac959098b15510f836527d529a3fcab5087fd95bf8d3f44893b0fc818
SHA512c9adb91678bb96003f6a00eaa0b6a08da0ed5789579e18e698a9e4d4e8b510ec1f0a5ae7b630b75e96e856e7d6c90b9c89f467feec4f3ec7250cf88d358506fe
-
Filesize
39.4MB
MD5c3c8df949b27c32fc5bb18c2477f60d6
SHA1e360fd6bfcd56aca90b35cf5c8ba4954de8b23b6
SHA2566df2ec3ac959098b15510f836527d529a3fcab5087fd95bf8d3f44893b0fc818
SHA512c9adb91678bb96003f6a00eaa0b6a08da0ed5789579e18e698a9e4d4e8b510ec1f0a5ae7b630b75e96e856e7d6c90b9c89f467feec4f3ec7250cf88d358506fe