Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 03:43
Static task
static1
General
-
Target
dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe
-
Size
375KB
-
MD5
717134ce585b8c86a55912e9c116c0f4
-
SHA1
3d4c8dc5556a594d841885289fb141b905192d1f
-
SHA256
dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07
-
SHA512
888d211049994f732f0615bf4a75d990eebca841e5e5f4d031fb87324fb924a2c192601be7387887585359c94a006927a24040921dc540778cd93cf9b9a8d9e1
-
SSDEEP
6144:Bv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:B4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2016-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2016-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2016-177-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2016-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2016-190-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4204-277-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4892-304-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1776-363-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4892-374-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4204 SQLSerasi.exe 4892 SQLSerasi.exe 1776 SQLSerasi.exe -
resource yara_rule behavioral1/memory/2016-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2016-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2016-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2016-177-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2016-178-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2016-190-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4204-277-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4892-304-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1776-363-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4892-374-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2016 dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe Token: SeDebugPrivilege 4204 SQLSerasi.exe Token: SeDebugPrivilege 4892 SQLSerasi.exe Token: SeDebugPrivilege 4892 SQLSerasi.exe Token: SeDebugPrivilege 1776 SQLSerasi.exe Token: SeDebugPrivilege 1776 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4204 2016 dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe 66 PID 2016 wrote to memory of 4204 2016 dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe 66 PID 2016 wrote to memory of 4204 2016 dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe 66 PID 4892 wrote to memory of 1776 4892 SQLSerasi.exe 68 PID 4892 wrote to memory of 1776 4892 SQLSerasi.exe 68 PID 4892 wrote to memory of 1776 4892 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe"C:\Users\Admin\AppData\Local\Temp\dcbefe5f882c228d2382ccdc6caac35cd790b1e82f402766527e0ad40c738b07.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5db3b2dc05fe0346f4328ddf594503879
SHA17bf61e616cc3864381ccac37372f060aed4d7103
SHA2566a0163afd3825db673b8940c152e4f75811139a23e2a9843e2de12ffe3d9fec3
SHA512171a64ce8e599272c5da18b326a9030d80e5abb297597e0de8db8617860925b30d58628a12e32e60608b41bfc566ffc770221fe8a119ef508f6e348ec60c6b03
-
Filesize
39.4MB
MD5db3b2dc05fe0346f4328ddf594503879
SHA17bf61e616cc3864381ccac37372f060aed4d7103
SHA2566a0163afd3825db673b8940c152e4f75811139a23e2a9843e2de12ffe3d9fec3
SHA512171a64ce8e599272c5da18b326a9030d80e5abb297597e0de8db8617860925b30d58628a12e32e60608b41bfc566ffc770221fe8a119ef508f6e348ec60c6b03
-
Filesize
39.4MB
MD5db3b2dc05fe0346f4328ddf594503879
SHA17bf61e616cc3864381ccac37372f060aed4d7103
SHA2566a0163afd3825db673b8940c152e4f75811139a23e2a9843e2de12ffe3d9fec3
SHA512171a64ce8e599272c5da18b326a9030d80e5abb297597e0de8db8617860925b30d58628a12e32e60608b41bfc566ffc770221fe8a119ef508f6e348ec60c6b03
-
Filesize
39.4MB
MD5db3b2dc05fe0346f4328ddf594503879
SHA17bf61e616cc3864381ccac37372f060aed4d7103
SHA2566a0163afd3825db673b8940c152e4f75811139a23e2a9843e2de12ffe3d9fec3
SHA512171a64ce8e599272c5da18b326a9030d80e5abb297597e0de8db8617860925b30d58628a12e32e60608b41bfc566ffc770221fe8a119ef508f6e348ec60c6b03