Overview
overview
10Static
static
7Loaders/EA...er.exe
windows10-1703-x64
5Loaders/EA...er.exe
windows10-2004-x64
7Loaders/FN Chair.exe
windows10-1703-x64
10Loaders/FN Chair.exe
windows10-2004-x64
9Cleaners/a...er.exe
windows10-1703-x64
9Cleaners/a...er.exe
windows10-2004-x64
9Cleaners/a...ed.exe
windows10-1703-x64
9Cleaners/a...ed.exe
windows10-2004-x64
9Cleaners/c..._1.exe
windows10-1703-x64
9Cleaners/c..._1.exe
windows10-2004-x64
9Cleaners/c..._2.exe
windows10-1703-x64
7Cleaners/c..._2.exe
windows10-2004-x64
7Loaders/Gh...II.exe
windows10-1703-x64
9Loaders/Gh...II.exe
windows10-2004-x64
9Loaders/Khemical.exe
windows10-1703-x64
9Loaders/Khemical.exe
windows10-2004-x64
9Loaders/Mu...er.exe
windows10-1703-x64
9Loaders/Mu...er.exe
windows10-2004-x64
9Loaders/WZ...V1.exe
windows10-1703-x64
5Loaders/WZ...V1.exe
windows10-2004-x64
5Loaders/WZ...V2.exe
windows10-1703-x64
5Loaders/WZ...V2.exe
windows10-2004-x64
5Loaders/WZ...er.exe
windows10-1703-x64
9Loaders/WZ...er.exe
windows10-2004-x64
9Loaders/WZ...ir.exe
windows10-1703-x64
9Loaders/WZ...ir.exe
windows10-2004-x64
9Analysis
-
max time kernel
142s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 05:36
Behavioral task
behavioral1
Sample
Loaders/EAC BE Spwoofer.exe
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
Loaders/EAC BE Spwoofer.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Loaders/FN Chair.exe
Resource
win10-20231020-en
Behavioral task
behavioral4
Sample
Loaders/FN Chair.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Cleaners/applecleaner.exe
Resource
win10-20231020-en
Behavioral task
behavioral6
Sample
Cleaners/applecleaner.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Cleaners/applecleaner_updated.exe
Resource
win10-20231023-en
Behavioral task
behavioral8
Sample
Cleaners/applecleaner_updated.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Cleaners/cleaner_1.exe
Resource
win10-20231020-en
Behavioral task
behavioral10
Sample
Cleaners/cleaner_1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Cleaners/cleaner_fixed_2.exe
Resource
win10-20231025-en
Behavioral task
behavioral12
Sample
Cleaners/cleaner_fixed_2.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Loaders/GhostWare_MWIII.exe
Resource
win10-20231023-en
Behavioral task
behavioral14
Sample
Loaders/GhostWare_MWIII.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Loaders/Khemical.exe
Resource
win10-20231020-en
Behavioral task
behavioral16
Sample
Loaders/Khemical.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Loaders/Multi Spwoofer.exe
Resource
win10-20231020-en
Behavioral task
behavioral18
Sample
Loaders/Multi Spwoofer.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Loaders/WZ2 AIO V1.exe
Resource
win10-20231020-en
Behavioral task
behavioral20
Sample
Loaders/WZ2 AIO V1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Loaders/WZ2 AIO V2.exe
Resource
win10-20231025-en
Behavioral task
behavioral22
Sample
Loaders/WZ2 AIO V2.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Loaders/WZ2 UA Spwoofer.exe
Resource
win10-20231020-en
Behavioral task
behavioral24
Sample
Loaders/WZ2 UA Spwoofer.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Loaders/WZ2 VIP Chair.exe
Resource
win10-20231023-en
General
-
Target
Loaders/GhostWare_MWIII.exe
-
Size
3.9MB
-
MD5
c0b0feb7e8770977ec896f251ed6139b
-
SHA1
837420079536b8d2bae850c4ec84ba86bd8238d3
-
SHA256
35b2b5a3816ec3bf51819cba02f3e1e76c9e1f306f9b2ab5bcdeb5ef8eb56273
-
SHA512
ccc0b3374fe053b70a37053df92da552b8a67bb8758b8fd6aa4fb125f51efee6a1c166c70e6b8b4568ccb6ab42a4b88f82d7a2ea2294efaa29eadb0eb52a69e9
-
SSDEEP
98304:/U7BSF+8NNIu0UHPPvykGgx8gBPMYLXu+uSgz3/:/WSzDIu0UHPPvy1gxPBPMaXu+uRzv
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GhostWare_MWIII.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GhostWare_MWIII.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GhostWare_MWIII.exe -
resource yara_rule behavioral14/memory/3896-0-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-1-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-2-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-3-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-4-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-5-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-6-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-7-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-8-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-9-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-10-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-16-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida behavioral14/memory/3896-17-0x00007FF6756F0000-0x00007FF676181000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GhostWare_MWIII.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3896 GhostWare_MWIII.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3896 GhostWare_MWIII.exe -
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 15 curl/8.2.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loaders\GhostWare_MWIII.exe"C:\Users\Admin\AppData\Local\Temp\Loaders\GhostWare_MWIII.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3896