Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 13:41
Static task
static1
General
-
Target
6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe
-
Size
375KB
-
MD5
d0eb4cfd79d55dd0c2fc4309107413a7
-
SHA1
ef9eee5f88650401deed641dc1bfb7b94a7a985b
-
SHA256
6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116
-
SHA512
6373ab8c2f823e70a5311436483ba2a3a899f69483dcf9d0e2e6d0e8486568c72239a9469784f00a761443f7d166f798a7b90e4004a36fc95d925f9277d4e6b1
-
SSDEEP
6144:sv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:s4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/3632-136-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3632-137-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3632-138-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1436-148-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4556-154-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4556-155-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4556-158-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3480-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3784-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3480-178-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 4 IoCs
pid Process 1436 SQLSerasi.exe 4556 SQLSerasi.exe 3480 SQLSerasi.exe 3784 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3632-133-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3632-136-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3632-137-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3632-138-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1436-148-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4556-150-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4556-154-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4556-155-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4556-158-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3480-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3784-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3480-178-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1628 4556 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3632 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe Token: SeDebugPrivilege 1436 SQLSerasi.exe Token: SeDebugPrivilege 4556 SQLSerasi.exe Token: SeDebugPrivilege 4556 SQLSerasi.exe Token: SeDebugPrivilege 4556 SQLSerasi.exe Token: SeDebugPrivilege 3480 SQLSerasi.exe Token: SeDebugPrivilege 3784 SQLSerasi.exe Token: SeDebugPrivilege 3480 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1436 3632 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe 82 PID 3632 wrote to memory of 1436 3632 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe 82 PID 3632 wrote to memory of 1436 3632 6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe 82 PID 4556 wrote to memory of 3480 4556 SQLSerasi.exe 85 PID 4556 wrote to memory of 3480 4556 SQLSerasi.exe 85 PID 4556 wrote to memory of 3480 4556 SQLSerasi.exe 85 PID 4556 wrote to memory of 3784 4556 SQLSerasi.exe 84 PID 4556 wrote to memory of 3784 4556 SQLSerasi.exe 84 PID 4556 wrote to memory of 3784 4556 SQLSerasi.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe"C:\Users\Admin\AppData\Local\Temp\6485a668d583fa351f28779f20f210539154122c3fe5f8f5c732048275226116.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 5762⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:3980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD55c0cbd08cda5ab8f908e240087af5223
SHA19f975dd199392e903ce3c33719088fecfaaea9fc
SHA256c969f0d4a12434a1fceffb4fb3cd5649b203fe20a9206323ed52e88f68df242f
SHA512513d63624bab0358445a75000cae9cbaf15eb1e99c7dbf5b8e7190c55f6250c36d4d0a8c42ce7021a6306c6bb0009269bebec85d2bfd681d80ae6cc10e0de738
-
Filesize
39.4MB
MD55c0cbd08cda5ab8f908e240087af5223
SHA19f975dd199392e903ce3c33719088fecfaaea9fc
SHA256c969f0d4a12434a1fceffb4fb3cd5649b203fe20a9206323ed52e88f68df242f
SHA512513d63624bab0358445a75000cae9cbaf15eb1e99c7dbf5b8e7190c55f6250c36d4d0a8c42ce7021a6306c6bb0009269bebec85d2bfd681d80ae6cc10e0de738
-
Filesize
39.4MB
MD55c0cbd08cda5ab8f908e240087af5223
SHA19f975dd199392e903ce3c33719088fecfaaea9fc
SHA256c969f0d4a12434a1fceffb4fb3cd5649b203fe20a9206323ed52e88f68df242f
SHA512513d63624bab0358445a75000cae9cbaf15eb1e99c7dbf5b8e7190c55f6250c36d4d0a8c42ce7021a6306c6bb0009269bebec85d2bfd681d80ae6cc10e0de738
-
Filesize
39.4MB
MD55c0cbd08cda5ab8f908e240087af5223
SHA19f975dd199392e903ce3c33719088fecfaaea9fc
SHA256c969f0d4a12434a1fceffb4fb3cd5649b203fe20a9206323ed52e88f68df242f
SHA512513d63624bab0358445a75000cae9cbaf15eb1e99c7dbf5b8e7190c55f6250c36d4d0a8c42ce7021a6306c6bb0009269bebec85d2bfd681d80ae6cc10e0de738
-
Filesize
39.4MB
MD55c0cbd08cda5ab8f908e240087af5223
SHA19f975dd199392e903ce3c33719088fecfaaea9fc
SHA256c969f0d4a12434a1fceffb4fb3cd5649b203fe20a9206323ed52e88f68df242f
SHA512513d63624bab0358445a75000cae9cbaf15eb1e99c7dbf5b8e7190c55f6250c36d4d0a8c42ce7021a6306c6bb0009269bebec85d2bfd681d80ae6cc10e0de738