Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-10-2022 02:05

General

  • Target

    7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe

  • Size

    375KB

  • MD5

    433526fc27529dc1c13b3c9de998b06b

  • SHA1

    b8de517b29c3d13a849f45762743e5e94c455ed3

  • SHA256

    7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba

  • SHA512

    c5f9c0ca30aa4b83d3e7125ea36fd8ac372c94a02aa46db5b6c42390efae9cf49c24f0080bbb1ca6a2ee8e7b2a6676e4da73724d68991b6c23f4a6adb0ab8cec

  • SSDEEP

    6144:hv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:h4VOiF1WD7kE1dTYOi8V5u23zmWFy4

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 9 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe
    "C:\Users\Admin\AppData\Local\Temp\7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2928
  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
    "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe
      "C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    a894728fd8a6071cd8535d386e84b4dc

    SHA1

    ebec23d7c085ea04cd46ef237ef4f4e139e040de

    SHA256

    97d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03

    SHA512

    1df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    a894728fd8a6071cd8535d386e84b4dc

    SHA1

    ebec23d7c085ea04cd46ef237ef4f4e139e040de

    SHA256

    97d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03

    SHA512

    1df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    a894728fd8a6071cd8535d386e84b4dc

    SHA1

    ebec23d7c085ea04cd46ef237ef4f4e139e040de

    SHA256

    97d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03

    SHA512

    1df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62

  • C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe

    Filesize

    39.4MB

    MD5

    a894728fd8a6071cd8535d386e84b4dc

    SHA1

    ebec23d7c085ea04cd46ef237ef4f4e139e040de

    SHA256

    97d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03

    SHA512

    1df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62

  • memory/564-156-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-186-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-122-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-123-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-124-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-125-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-126-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-127-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-128-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-129-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/564-130-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-131-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-132-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-133-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-134-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-135-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-136-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-137-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-138-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-140-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-139-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-141-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-142-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-143-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-144-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-145-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-146-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-147-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-148-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-149-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-150-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-151-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-152-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-153-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-154-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-155-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-168-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-157-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-121-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-159-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-160-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-161-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-162-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-163-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-164-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-165-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-166-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-167-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-120-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-169-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-170-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/564-175-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/564-174-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/564-173-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-176-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/564-177-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-178-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-179-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/564-180-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-181-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-182-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-183-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-184-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-185-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-158-0x0000000077D60000-0x0000000077EEE000-memory.dmp

    Filesize

    1.6MB

  • memory/564-192-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2928-260-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/2928-303-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3356-302-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/3356-372-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3356-373-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4436-360-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4436-368-0x0000000010000000-0x0000000010362000-memory.dmp

    Filesize

    3.4MB

  • memory/4436-374-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB