Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 14:38

General

  • Target

    ghostS.exe

  • Size

    1.7MB

  • MD5

    8ec1dc41329c12c454595fbfd39f88c2

  • SHA1

    81aaa39802905c8b3ee132c978ddb3cc3f3db1b5

  • SHA256

    8d5b02d29deaf800edf09adc815823f736569041a71d78217acf72444eae9264

  • SHA512

    56d8f00dfadc9fbdca948d88e9b2fd6e8f8f19fb0c730ca1001b11f5c86e74ece0c8fbf4dc15fda644145a17412a53d8bf09458d621721210eb5b179ebc5ac99

  • SSDEEP

    24576:ut+PGXJIYJgv8E32bpXnKKLA3FEQTdHUOD0/WkdmKaMaOhh:wJXJQ32l3tLtIHXAOkdm

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 48 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 40 IoCs
  • Runs .reg file with regedit 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ghostS.exe
    "C:\Users\Admin\AppData\Local\Temp\ghostS.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\Coder.exe
      "C:\Users\Admin\AppData\Local\Temp\Coder.exe" /n /fh mirc
      2⤵
        PID:4192
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 789.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4436
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 343.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:1884
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 594.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:1280
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 289.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:3600
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 780.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4832
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 991.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:5100
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 420.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:3140
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 645.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:460
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 715.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:920
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 254.reg
        2⤵
        • Runs .reg file with regedit
        PID:4928
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 690.reg
        2⤵
        • Runs .reg file with regedit
        PID:4660
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 943.reg
        2⤵
        • Runs .reg file with regedit
        PID:5116
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 928.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:1888
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 669.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:1432
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 865.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:3176
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 997.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4036
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 855.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4232
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 129.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4788
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 437.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4648
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 833.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4304
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 117.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:828
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 620.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:1596
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 272.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:4436
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 184.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:3140
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 151.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:916
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 226.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:3544
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s 998.reg
        2⤵
        • Adds Run key to start application
        • Runs .reg file with regedit
        PID:2344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\117.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\129.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\151.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\184.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\226.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\272.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\289.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\343.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\420.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\437.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\594.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\620.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\645.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\669.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\715.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\780.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\789.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\833.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\855.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\865.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\928.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\991.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\997.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • C:\Users\Admin\AppData\Local\Temp\998.reg

      Filesize

      145B

      MD5

      a0f0d8e49925865b3d8612353053af12

      SHA1

      c3e9d41b0f6a658cb24abd698c0eb40f6ca678e8

      SHA256

      8a08c550181386a2fc6da121f559d01dab10cbec356030758c3b5fcda32cff84

      SHA512

      8e3b2160c3c60f184f9aad929f50db4c14c7290bc2a9bf1e388cb926971bd8cb912008f58619fd79304c21e17d10a111b9daffe55e00a559cb7c60d2926e232b

    • memory/460-148-0x0000000000000000-mapping.dmp

    • memory/828-171-0x0000000000000000-mapping.dmp

    • memory/916-179-0x0000000000000000-mapping.dmp

    • memory/920-150-0x0000000000000000-mapping.dmp

    • memory/1280-138-0x0000000000000000-mapping.dmp

    • memory/1432-157-0x0000000000000000-mapping.dmp

    • memory/1596-173-0x0000000000000000-mapping.dmp

    • memory/1884-136-0x0000000000000000-mapping.dmp

    • memory/1888-155-0x0000000000000000-mapping.dmp

    • memory/2344-183-0x0000000000000000-mapping.dmp

    • memory/3140-146-0x0000000000000000-mapping.dmp

    • memory/3140-177-0x0000000000000000-mapping.dmp

    • memory/3176-159-0x0000000000000000-mapping.dmp

    • memory/3544-181-0x0000000000000000-mapping.dmp

    • memory/3600-140-0x0000000000000000-mapping.dmp

    • memory/4036-161-0x0000000000000000-mapping.dmp

    • memory/4192-132-0x0000000000000000-mapping.dmp

    • memory/4192-133-0x0000000000400000-0x0000000000480000-memory.dmp

      Filesize

      512KB

    • memory/4232-163-0x0000000000000000-mapping.dmp

    • memory/4304-169-0x0000000000000000-mapping.dmp

    • memory/4436-134-0x0000000000000000-mapping.dmp

    • memory/4436-175-0x0000000000000000-mapping.dmp

    • memory/4648-167-0x0000000000000000-mapping.dmp

    • memory/4660-153-0x0000000000000000-mapping.dmp

    • memory/4788-165-0x0000000000000000-mapping.dmp

    • memory/4832-142-0x0000000000000000-mapping.dmp

    • memory/4928-152-0x0000000000000000-mapping.dmp

    • memory/5100-144-0x0000000000000000-mapping.dmp

    • memory/5116-154-0x0000000000000000-mapping.dmp