Overview
overview
7Static
static
Coder.exe
windows7-x64
1Coder.exe
windows10-2004-x64
1Ghost[1].js
windows7-x64
1Ghost[1].js
windows10-2004-x64
1Ghost[2].ps1
windows7-x64
1Ghost[2].ps1
windows10-2004-x64
1Ghost[3].js
windows7-x64
1Ghost[3].js
windows10-2004-x64
1Ghost[4].cpl
windows7-x64
1Ghost[4].cpl
windows10-2004-x64
1Ghost[5].cpl
windows7-x64
1Ghost[5].cpl
windows10-2004-x64
1Ghost[6].cpl
windows7-x64
1Ghost[6].cpl
windows10-2004-x64
1Ghost[o].cpl
windows7-x64
1Ghost[o].cpl
windows10-2004-x64
1Ghost[x].cpl
windows7-x64
1Ghost[x].cpl
windows10-2004-x64
1ghostS.exe
windows7-x64
6ghostS.exe
windows10-2004-x64
7Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Coder.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Coder.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Ghost[1].js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Ghost[1].js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Ghost[2].ps1
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Ghost[2].ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Ghost[3].js
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Ghost[3].js
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Ghost[4].cpl
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Ghost[4].cpl
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Ghost[5].cpl
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
Ghost[5].cpl
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
Ghost[6].cpl
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Ghost[6].cpl
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
Ghost[o].cpl
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Ghost[o].cpl
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
Ghost[x].cpl
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Ghost[x].cpl
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
ghostS.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
ghostS.exe
Resource
win10v2004-20221111-en
General
-
Target
ghostS.exe
-
Size
1.7MB
-
MD5
8ec1dc41329c12c454595fbfd39f88c2
-
SHA1
81aaa39802905c8b3ee132c978ddb3cc3f3db1b5
-
SHA256
8d5b02d29deaf800edf09adc815823f736569041a71d78217acf72444eae9264
-
SHA512
56d8f00dfadc9fbdca948d88e9b2fd6e8f8f19fb0c730ca1001b11f5c86e74ece0c8fbf4dc15fda644145a17412a53d8bf09458d621721210eb5b179ebc5ac99
-
SSDEEP
24576:ut+PGXJIYJgv8E32bpXnKKLA3FEQTdHUOD0/WkdmKaMaOhh:wJXJQ32l3tLtIHXAOkdm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ghostS.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ISPSERVICE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe" regedit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "v1r" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command ghostS.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "v1r" ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe\" -noconnect" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe\" -noconnect" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe\"" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ghostS.exe\"" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open ghostS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell ghostS.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec ghostS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" ghostS.exe -
Runs .reg file with regedit 27 IoCs
pid Process 920 regedit.exe 1888 regedit.exe 4232 regedit.exe 4660 regedit.exe 3176 regedit.exe 4788 regedit.exe 4304 regedit.exe 3140 regedit.exe 1884 regedit.exe 3544 regedit.exe 4832 regedit.exe 4036 regedit.exe 4436 regedit.exe 4436 regedit.exe 460 regedit.exe 828 regedit.exe 1280 regedit.exe 4928 regedit.exe 1432 regedit.exe 4648 regedit.exe 2344 regedit.exe 3600 regedit.exe 3140 regedit.exe 5116 regedit.exe 1596 regedit.exe 916 regedit.exe 5100 regedit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 ghostS.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 ghostS.exe 1344 ghostS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4192 1344 ghostS.exe 88 PID 1344 wrote to memory of 4192 1344 ghostS.exe 88 PID 1344 wrote to memory of 4192 1344 ghostS.exe 88 PID 1344 wrote to memory of 4436 1344 ghostS.exe 89 PID 1344 wrote to memory of 4436 1344 ghostS.exe 89 PID 1344 wrote to memory of 4436 1344 ghostS.exe 89 PID 1344 wrote to memory of 1884 1344 ghostS.exe 90 PID 1344 wrote to memory of 1884 1344 ghostS.exe 90 PID 1344 wrote to memory of 1884 1344 ghostS.exe 90 PID 1344 wrote to memory of 1280 1344 ghostS.exe 91 PID 1344 wrote to memory of 1280 1344 ghostS.exe 91 PID 1344 wrote to memory of 1280 1344 ghostS.exe 91 PID 1344 wrote to memory of 3600 1344 ghostS.exe 92 PID 1344 wrote to memory of 3600 1344 ghostS.exe 92 PID 1344 wrote to memory of 3600 1344 ghostS.exe 92 PID 1344 wrote to memory of 4832 1344 ghostS.exe 95 PID 1344 wrote to memory of 4832 1344 ghostS.exe 95 PID 1344 wrote to memory of 4832 1344 ghostS.exe 95 PID 1344 wrote to memory of 5100 1344 ghostS.exe 96 PID 1344 wrote to memory of 5100 1344 ghostS.exe 96 PID 1344 wrote to memory of 5100 1344 ghostS.exe 96 PID 1344 wrote to memory of 3140 1344 ghostS.exe 97 PID 1344 wrote to memory of 3140 1344 ghostS.exe 97 PID 1344 wrote to memory of 3140 1344 ghostS.exe 97 PID 1344 wrote to memory of 460 1344 ghostS.exe 98 PID 1344 wrote to memory of 460 1344 ghostS.exe 98 PID 1344 wrote to memory of 460 1344 ghostS.exe 98 PID 1344 wrote to memory of 920 1344 ghostS.exe 99 PID 1344 wrote to memory of 920 1344 ghostS.exe 99 PID 1344 wrote to memory of 920 1344 ghostS.exe 99 PID 1344 wrote to memory of 4928 1344 ghostS.exe 100 PID 1344 wrote to memory of 4928 1344 ghostS.exe 100 PID 1344 wrote to memory of 4928 1344 ghostS.exe 100 PID 1344 wrote to memory of 4660 1344 ghostS.exe 101 PID 1344 wrote to memory of 4660 1344 ghostS.exe 101 PID 1344 wrote to memory of 4660 1344 ghostS.exe 101 PID 1344 wrote to memory of 5116 1344 ghostS.exe 102 PID 1344 wrote to memory of 5116 1344 ghostS.exe 102 PID 1344 wrote to memory of 5116 1344 ghostS.exe 102 PID 1344 wrote to memory of 1888 1344 ghostS.exe 103 PID 1344 wrote to memory of 1888 1344 ghostS.exe 103 PID 1344 wrote to memory of 1888 1344 ghostS.exe 103 PID 1344 wrote to memory of 1432 1344 ghostS.exe 105 PID 1344 wrote to memory of 1432 1344 ghostS.exe 105 PID 1344 wrote to memory of 1432 1344 ghostS.exe 105 PID 1344 wrote to memory of 3176 1344 ghostS.exe 107 PID 1344 wrote to memory of 3176 1344 ghostS.exe 107 PID 1344 wrote to memory of 3176 1344 ghostS.exe 107 PID 1344 wrote to memory of 4036 1344 ghostS.exe 109 PID 1344 wrote to memory of 4036 1344 ghostS.exe 109 PID 1344 wrote to memory of 4036 1344 ghostS.exe 109 PID 1344 wrote to memory of 4232 1344 ghostS.exe 110 PID 1344 wrote to memory of 4232 1344 ghostS.exe 110 PID 1344 wrote to memory of 4232 1344 ghostS.exe 110 PID 1344 wrote to memory of 4788 1344 ghostS.exe 112 PID 1344 wrote to memory of 4788 1344 ghostS.exe 112 PID 1344 wrote to memory of 4788 1344 ghostS.exe 112 PID 1344 wrote to memory of 4648 1344 ghostS.exe 113 PID 1344 wrote to memory of 4648 1344 ghostS.exe 113 PID 1344 wrote to memory of 4648 1344 ghostS.exe 113 PID 1344 wrote to memory of 4304 1344 ghostS.exe 114 PID 1344 wrote to memory of 4304 1344 ghostS.exe 114 PID 1344 wrote to memory of 4304 1344 ghostS.exe 114 PID 1344 wrote to memory of 828 1344 ghostS.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\ghostS.exe"C:\Users\Admin\AppData\Local\Temp\ghostS.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Coder.exe"C:\Users\Admin\AppData\Local\Temp\Coder.exe" /n /fh mirc2⤵PID:4192
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 789.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4436
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 343.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1884
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 594.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1280
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 289.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:3600
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 780.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4832
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 991.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:5100
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 420.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:3140
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 645.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:460
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 715.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:920
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 254.reg2⤵
- Runs .reg file with regedit
PID:4928
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 690.reg2⤵
- Runs .reg file with regedit
PID:4660
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 943.reg2⤵
- Runs .reg file with regedit
PID:5116
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 928.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1888
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 669.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1432
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 865.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:3176
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 997.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4036
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 855.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4232
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 129.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4788
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 437.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4648
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 833.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4304
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 117.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:828
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 620.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1596
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 272.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4436
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 184.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:3140
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 151.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:916
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 226.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:3544
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s 998.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b
-
Filesize
145B
MD5a0f0d8e49925865b3d8612353053af12
SHA1c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8
SHA2568a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84
SHA5128e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b