Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11/10/2022, 14:24
Static task
static1
General
-
Target
03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe
-
Size
375KB
-
MD5
452b57aab1062b84d1a9b2ae01498cb0
-
SHA1
2288573ff3470551551813cf047a5d34099963ab
-
SHA256
03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d
-
SHA512
cdf733866bb29555cb0d3f6e6bc29e7e12449c9bf2e65b96bc08290c030ec28937915bf9b350b4d5643cda1584b37797cb417d6640fb172f63bdf155b576ee35
-
SSDEEP
6144:5v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:54VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/3048-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3048-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/2452-245-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/64-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/64-302-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4200-358-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4200-371-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 2452 SQLSerasi.exe 64 SQLSerasi.exe 4200 SQLSerasi.exe -
resource yara_rule behavioral1/memory/3048-167-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-173-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3048-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/2452-245-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/64-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/64-302-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4200-358-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4200-371-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3048 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe Token: SeDebugPrivilege 2452 SQLSerasi.exe Token: SeDebugPrivilege 64 SQLSerasi.exe Token: SeDebugPrivilege 64 SQLSerasi.exe Token: SeDebugPrivilege 4200 SQLSerasi.exe Token: SeDebugPrivilege 4200 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2452 3048 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe 66 PID 3048 wrote to memory of 2452 3048 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe 66 PID 3048 wrote to memory of 2452 3048 03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe 66 PID 64 wrote to memory of 4200 64 SQLSerasi.exe 68 PID 64 wrote to memory of 4200 64 SQLSerasi.exe 68 PID 64 wrote to memory of 4200 64 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe"C:\Users\Admin\AppData\Local\Temp\03cf8408d0f019e39bab7044c7fd6ac50e3a1842827f847659d47268cab2e49d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD5ddb8ddc5368a579041eb9c519a8c97f6
SHA175047b6b1ac82ea17cec8af6133b8317527b530b
SHA256ee8626dfb063694963881e113327e9f9a6376cd1b5a6cdc701e58a08883daf2c
SHA5120faef48f82948807d0fe54d54988d6eaec4687228937a0ebee7cfbf0487faccd38a4dc799e9e8af0e839191669885debe00f38b9387a7a17be895e21d626c3ad
-
Filesize
39.4MB
MD5ddb8ddc5368a579041eb9c519a8c97f6
SHA175047b6b1ac82ea17cec8af6133b8317527b530b
SHA256ee8626dfb063694963881e113327e9f9a6376cd1b5a6cdc701e58a08883daf2c
SHA5120faef48f82948807d0fe54d54988d6eaec4687228937a0ebee7cfbf0487faccd38a4dc799e9e8af0e839191669885debe00f38b9387a7a17be895e21d626c3ad
-
Filesize
39.4MB
MD5ddb8ddc5368a579041eb9c519a8c97f6
SHA175047b6b1ac82ea17cec8af6133b8317527b530b
SHA256ee8626dfb063694963881e113327e9f9a6376cd1b5a6cdc701e58a08883daf2c
SHA5120faef48f82948807d0fe54d54988d6eaec4687228937a0ebee7cfbf0487faccd38a4dc799e9e8af0e839191669885debe00f38b9387a7a17be895e21d626c3ad
-
Filesize
39.4MB
MD5ddb8ddc5368a579041eb9c519a8c97f6
SHA175047b6b1ac82ea17cec8af6133b8317527b530b
SHA256ee8626dfb063694963881e113327e9f9a6376cd1b5a6cdc701e58a08883daf2c
SHA5120faef48f82948807d0fe54d54988d6eaec4687228937a0ebee7cfbf0487faccd38a4dc799e9e8af0e839191669885debe00f38b9387a7a17be895e21d626c3ad