Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2022 02:05
Static task
static1
General
-
Target
7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe
-
Size
375KB
-
MD5
433526fc27529dc1c13b3c9de998b06b
-
SHA1
b8de517b29c3d13a849f45762743e5e94c455ed3
-
SHA256
7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba
-
SHA512
c5f9c0ca30aa4b83d3e7125ea36fd8ac372c94a02aa46db5b6c42390efae9cf49c24f0080bbb1ca6a2ee8e7b2a6676e4da73724d68991b6c23f4a6adb0ab8cec
-
SSDEEP
6144:hv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:h4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/564-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/564-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/564-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/564-179-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2928-260-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3356-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4436-360-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4436-368-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3356-373-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 2928 SQLSerasi.exe 3356 SQLSerasi.exe 4436 SQLSerasi.exe -
resource yara_rule behavioral1/memory/564-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/564-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/564-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/564-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/564-179-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2928-260-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3356-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4436-360-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4436-368-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3356-373-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 564 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe Token: SeDebugPrivilege 2928 SQLSerasi.exe Token: SeDebugPrivilege 3356 SQLSerasi.exe Token: SeDebugPrivilege 3356 SQLSerasi.exe Token: SeDebugPrivilege 4436 SQLSerasi.exe Token: SeDebugPrivilege 4436 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 564 wrote to memory of 2928 564 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe 66 PID 564 wrote to memory of 2928 564 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe 66 PID 564 wrote to memory of 2928 564 7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe 66 PID 3356 wrote to memory of 4436 3356 SQLSerasi.exe 68 PID 3356 wrote to memory of 4436 3356 SQLSerasi.exe 68 PID 3356 wrote to memory of 4436 3356 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe"C:\Users\Admin\AppData\Local\Temp\7e118dd4c1168b39646bc98a598535c09472e7c1eb49ba696b42a1acc9e7bdba.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5a894728fd8a6071cd8535d386e84b4dc
SHA1ebec23d7c085ea04cd46ef237ef4f4e139e040de
SHA25697d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03
SHA5121df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62
-
Filesize
39.4MB
MD5a894728fd8a6071cd8535d386e84b4dc
SHA1ebec23d7c085ea04cd46ef237ef4f4e139e040de
SHA25697d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03
SHA5121df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62
-
Filesize
39.4MB
MD5a894728fd8a6071cd8535d386e84b4dc
SHA1ebec23d7c085ea04cd46ef237ef4f4e139e040de
SHA25697d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03
SHA5121df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62
-
Filesize
39.4MB
MD5a894728fd8a6071cd8535d386e84b4dc
SHA1ebec23d7c085ea04cd46ef237ef4f4e139e040de
SHA25697d3980aa737395a325a41e7071b24434efdab1024a0992f7463aa6514d74d03
SHA5121df2fb92536786322b01bafd8ea74f8953f59ad0c7e70a622bfcb57b7b7a3f77b6f6c02650fc78a7e5bffc5093e6b17ddd131d94e46d52649d55948d020a2f62