Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2022, 15:30
Static task
static1
General
-
Target
aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe
-
Size
375KB
-
MD5
51d65b2110a8d181be41d7e315443b81
-
SHA1
22ede0bcf63a03c4641d7cdd5a04cc893e40abf2
-
SHA256
aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97
-
SHA512
37def8968cfadba4b48486f5ca03f8166b39c65cea375ca0bc4dd106493e626a8416c14c3734c39bc39447a7fda6d6a7a80c4e22e77eb49d3daa02b48c5a008b
-
SSDEEP
6144:Ev5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:E4VOiF1WD7kE1dTYOi8V5u23zmWFy4
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1524-171-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-170-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-172-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/1524-175-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/3348-280-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4192-299-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4124-359-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral1/memory/4192-368-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3348 SQLSerasi.exe 4192 SQLSerasi.exe 4124 SQLSerasi.exe -
resource yara_rule behavioral1/memory/1524-166-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-171-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-170-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-172-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/1524-175-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/3348-280-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4192-299-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4124-359-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral1/memory/4192-368-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SQLSerasi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQLSerasi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 SQLSerasi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString SQLSerasi.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 SQLSerasi.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SQLSerasi.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SQLSerasi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SQLSerasi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SQLSerasi.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1524 aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe Token: SeDebugPrivilege 3348 SQLSerasi.exe Token: SeDebugPrivilege 4192 SQLSerasi.exe Token: SeDebugPrivilege 4192 SQLSerasi.exe Token: SeDebugPrivilege 4124 SQLSerasi.exe Token: SeDebugPrivilege 4124 SQLSerasi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3348 1524 aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe 66 PID 1524 wrote to memory of 3348 1524 aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe 66 PID 1524 wrote to memory of 3348 1524 aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe 66 PID 4192 wrote to memory of 4124 4192 SQLSerasi.exe 68 PID 4192 wrote to memory of 4124 4192 SQLSerasi.exe 68 PID 4192 wrote to memory of 4124 4192 SQLSerasi.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe"C:\Users\Admin\AppData\Local\Temp\aa774a4149af83f70a0c22b1fb0be6b752c979397341940ed59d586e4b5acc97.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"C:\Program Files (x86)\Microsoft SQL Server\SQLSerasi.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39.4MB
MD51eb84a5cad8a7850f6515028916072e0
SHA16c6a0249ede0ffd6ed5cfffd95475bf91d78a077
SHA25639eca0ca3b0d10a835c84c476db632042d6fa68bc4561384c6bf5eb0066dd79d
SHA512d3c3b231840d30eb9bedc45f5da2a2b1b04c1e91fe33661b0660e87f4b60737fa600e7a77d7d29ffc282cbbde7c59e04fc64007313b69dc80dd71bc426de86e9
-
Filesize
39.4MB
MD51eb84a5cad8a7850f6515028916072e0
SHA16c6a0249ede0ffd6ed5cfffd95475bf91d78a077
SHA25639eca0ca3b0d10a835c84c476db632042d6fa68bc4561384c6bf5eb0066dd79d
SHA512d3c3b231840d30eb9bedc45f5da2a2b1b04c1e91fe33661b0660e87f4b60737fa600e7a77d7d29ffc282cbbde7c59e04fc64007313b69dc80dd71bc426de86e9
-
Filesize
39.4MB
MD51eb84a5cad8a7850f6515028916072e0
SHA16c6a0249ede0ffd6ed5cfffd95475bf91d78a077
SHA25639eca0ca3b0d10a835c84c476db632042d6fa68bc4561384c6bf5eb0066dd79d
SHA512d3c3b231840d30eb9bedc45f5da2a2b1b04c1e91fe33661b0660e87f4b60737fa600e7a77d7d29ffc282cbbde7c59e04fc64007313b69dc80dd71bc426de86e9
-
Filesize
39.4MB
MD51eb84a5cad8a7850f6515028916072e0
SHA16c6a0249ede0ffd6ed5cfffd95475bf91d78a077
SHA25639eca0ca3b0d10a835c84c476db632042d6fa68bc4561384c6bf5eb0066dd79d
SHA512d3c3b231840d30eb9bedc45f5da2a2b1b04c1e91fe33661b0660e87f4b60737fa600e7a77d7d29ffc282cbbde7c59e04fc64007313b69dc80dd71bc426de86e9