Analysis
-
max time kernel
129s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/10/2022, 11:46
Static task
static1
General
-
Target
e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe
-
Size
375KB
-
MD5
df01b35921eff781469bd8b38f7f5c90
-
SHA1
c711a7de3ecd7681f91e4113b0860a07e2b8628c
-
SHA256
e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14
-
SHA512
eb640fbb161f9741abed5d0d8853beb74e2bb8bf4132dd220dea0c541ac8fa87c576bee06f0ed80183d02efa9008cc884ee3498670070200253b0342c6f247c8
-
SSDEEP
6144:Lv5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:L4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/1148-174-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1148-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1148-176-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4884-269-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3684-307-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3380-360-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3380-373-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4884 SQLSerasi.exe 3684 SQLSerasi.exe 3380 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1148-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1148-174-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1148-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1148-176-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4884-269-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3684-307-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3380-360-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3380-373-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1148 e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe Token: SeDebugPrivilege 4884 SQLSerasi.exe Token: SeDebugPrivilege 3684 SQLSerasi.exe Token: SeDebugPrivilege 3684 SQLSerasi.exe Token: SeDebugPrivilege 3380 SQLSerasi.exe Token: SeDebugPrivilege 3380 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1148 wrote to memory of 4884 1148 e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe 66 PID 1148 wrote to memory of 4884 1148 e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe 66 PID 1148 wrote to memory of 4884 1148 e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe 66 PID 3684 wrote to memory of 3380 3684 SQLSerasi.exe 68 PID 3684 wrote to memory of 3380 3684 SQLSerasi.exe 68 PID 3684 wrote to memory of 3380 3684 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe"C:\Users\Admin\AppData\Local\Temp\e7fd9dd86b6adda5037fdb55896f7e5c98a7442bf3008f1d48d4a17251647d14.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD58afc730eda9096b86f621fa10b4236de
SHA19447360ea82dc5af903e218c70960a2d0aaba097
SHA256ca7b966b7c37e40e4b7e765ea9284d4e63be695849b7ffae3971ea4e491d56d0
SHA5128a30d2bc2c389cf4704674c861b8108b96e8bf92097ce4c450dad243fe0c3be44c89e992b33b9846f5b2e6c4611d2410afd81853521d50d7e8f0d643d3330466
-
Filesize
39.4MB
MD58afc730eda9096b86f621fa10b4236de
SHA19447360ea82dc5af903e218c70960a2d0aaba097
SHA256ca7b966b7c37e40e4b7e765ea9284d4e63be695849b7ffae3971ea4e491d56d0
SHA5128a30d2bc2c389cf4704674c861b8108b96e8bf92097ce4c450dad243fe0c3be44c89e992b33b9846f5b2e6c4611d2410afd81853521d50d7e8f0d643d3330466
-
Filesize
39.4MB
MD58afc730eda9096b86f621fa10b4236de
SHA19447360ea82dc5af903e218c70960a2d0aaba097
SHA256ca7b966b7c37e40e4b7e765ea9284d4e63be695849b7ffae3971ea4e491d56d0
SHA5128a30d2bc2c389cf4704674c861b8108b96e8bf92097ce4c450dad243fe0c3be44c89e992b33b9846f5b2e6c4611d2410afd81853521d50d7e8f0d643d3330466
-
Filesize
39.4MB
MD58afc730eda9096b86f621fa10b4236de
SHA19447360ea82dc5af903e218c70960a2d0aaba097
SHA256ca7b966b7c37e40e4b7e765ea9284d4e63be695849b7ffae3971ea4e491d56d0
SHA5128a30d2bc2c389cf4704674c861b8108b96e8bf92097ce4c450dad243fe0c3be44c89e992b33b9846f5b2e6c4611d2410afd81853521d50d7e8f0d643d3330466