Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
Walecz Ghost/Walecz.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Walecz Ghost/Walecz.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Walecz Ghost/Walecz.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Walecz Ghost/Walecz.exe
Resource
win10v2004-20231215-en
General
-
Target
Walecz Ghost/Walecz.exe
-
Size
146KB
-
MD5
bfb5f51b8d756dfd8d9967f040aea1fd
-
SHA1
1dfbe99ffd892eac768fd6e22f5b3951491cce3b
-
SHA256
8237289fd55427c9125c2caa00c047bfb03a0097d25c4cd9a7e817eea75cc5a7
-
SHA512
083349d6c5f323a2b6f1d0b80687fab52e784128d816bae3370d67e6dca94505fec4b1ebded3d4e617d9574fb0b1f2359650f18e4c7bf73e97f7c33ee570fbb8
-
SSDEEP
3072:bczkitvo4BpYN/6mBPry8TXROLdW5m4mUR19OOGA0kB:bA4NCmBPry/N2lOO5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000d890baf17611844e0383cb1a24458f4d90d8f842a4b0c349c26c4a0d75320147000000000e8000000002000020000000f68b8210f0ecd1887da54793259d34292a8245f03e1ea244e311ae52bd493f6720000000765a704715c51c1ca6de7e02b7f1340e1efb98801427e161a70ff8e15f50abce400000007b8e1396c95c2a6e69e72ef99844284a792821a4fce0ff6e126989c4a386a67c147aadb738242c76fb6406da61833ef20b1a3e5a6e8a343de585b3b36d612346 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70722d137536da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409589766" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35A9E041-A268-11EE-BD3E-4EA2EAC189B7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3012 2988 Walecz.exe 30 PID 2988 wrote to memory of 3012 2988 Walecz.exe 30 PID 2988 wrote to memory of 3012 2988 Walecz.exe 30 PID 3012 wrote to memory of 3028 3012 iexplore.exe 29 PID 3012 wrote to memory of 3028 3012 iexplore.exe 29 PID 3012 wrote to memory of 3028 3012 iexplore.exe 29 PID 3012 wrote to memory of 3028 3012 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Walecz Ghost\Walecz.exe"C:\Users\Admin\AppData\Local\Temp\Walecz Ghost\Walecz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.23&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5890eb83068fdd44849cd68ca639213c0
SHA163da2af4d656e7269d9d6049669e0f6ae850a3eb
SHA256d8de18acfcd8ddbb8ea947e2cb1e85c9300be425926440c29ac8c3248743aecd
SHA512aea4215eea7892208cade50dbadb92e4d77cb832f3a340c68478a5f666bcfc29263f82930a5cc552940e4040912d281ea06af75af2a3adbe94a132d2a76b7bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b3211f6edd731ae234240b19921882
SHA1cd169616817e17ad4894dc8b56a170d25e1aaf23
SHA256400029fde99b1797f12c5d55a2e37db33a77434c12d646b4d1b4155d5a4f3beb
SHA512955d9589d99e0c8567dfba38ce429e994281b3c6c80fb129da10a96b752a2ea8d04b969fad29178d068c18207c6a734adeca3d538d3b7287a4fa790a7693895b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57054eaea8b9eb46e89e5e12e82455dcb
SHA1f44592a9e06b3ada535f2da5d3aa11ddfe805c40
SHA25694a0fe23df23d86f7251a847b7dfe0d63fb81dc121ae3e240230efd834aa1277
SHA512e37edd001b2c5df40ae95c3c232c0e8f8d12ae81310ea8756c453b0ed45b015043fc910bf3e4fcd29545dd9b6b9ca37f2c4c240cd8584c9b309f9415dea859e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3755c5f33dc4c9d50ed495286528cb1
SHA19de83a12dea0c4e5c45d47622cdc095f56410566
SHA25671834de39b9395851b5149496a6b152ea402b98f75877616d6dc885ac7f902d8
SHA5122f727861371b36ba03823a2352024d06b83c0daa06bf636d77382657dac3529ff162955690f64f1b73db26366854a3f7399da62e485f2e666940344758e4ea8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a51d70f76b33a6df15c1f63d6f6411ef
SHA173a072373a3686229cbb54876a80f8827120810e
SHA2566c0019863461990cf5ffa2e91efae65ea4918e63e9d5aff03df0502b77e3685e
SHA512b405b0100881648f70576eb36829ffdfb797fc2c0754e86f00212ce4afca96e9c58220d7dddd83a4f280104bc8fc2bd8761ba325f8d0b76ed9c369c590b5566a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a15c292c44ac29bc691b21a1c52b5f89
SHA1a05656e75bde0109e92fd25a15dcf48d62610550
SHA256fe032fb0c7b95a1894fffaa97a40389677bb5ea3fd1c2f1108bbeb2930567b8b
SHA512b777d1eedd38a3c3b9d73d911378c84673425fc8aceecf226b674b7d2bb05c2eb34300e3b2b9bfcc4c3a07dca0265d2a7871c88e251bddf98f6243a719d3ff64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b591ef626ae109188d29a1dcafca5284
SHA17e321f215ab3284e792fba911953d4ef48c0be44
SHA256669522e7212ad001a6f9198cac731562ee3bd01b49baaeb486a7b003361d6df6
SHA5129d39d73789f803a7fff70890da1e798f2e6ca03cc022e05b3bf4d5d7cf21951ebeb8531aaea4c17ad63900f6270bef189949b18e22d56b48401ef1a5bfbff793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01e24e408baaa11b45386e6f62742ae
SHA15a2d582874cc7f7ca7c5b539e9058e10f0de19dc
SHA2560e62cb8ab2a7f6a1b442d2480f98a66db7cb6736ee7de25a127228baa90b434a
SHA51222a5480fc4074efa6ee8ef17b4192ea8eaab050f5e59f840a7e05eade98be55855bb890a51fab163f41566c952be3688fade4271c9e53d93bd42df379a911207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66d3a067d44f756e9d7f773961c0be9
SHA1f688614cc56c607f9e0248f65c2f701821cea702
SHA25609d172d0fecd522d1ae424cde0ff3986c72c0ad3d5b4102e8f5937f56374a5db
SHA5127829bd32936de385ef8166a7bb2afa207d21ce7f442029c01e39aeeea2f1b6f61b248e103afe319dc7fbd5c068ca7d047154b21792b93f62f88664bbf1e3f367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddcba73aba811ee57be685e58dcccd60
SHA15728af36b266baadb253236e17178aae424e838f
SHA256937e1f0d007c498eab4922d301a15332f7430ceb91cb0016a1c18b5b73bdffb3
SHA5121d934095fe22f2aedced64483e4477f6cf61a848f316f5e69de05791d7c3c99047340495560c05430c23cbb851f54fab55ecf92c1475298c0f93378f1f3574b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536158607b00567cf54408606d23fe672
SHA1e04282716d8c795202cd2db98397966a43a9a6b0
SHA256259dc7fbd3ff8fef57cea77cfa8c061a289204fafb52c3fbdcc99657139644d5
SHA512e7651b04aceecc343715f0d9029bcf31d68bd970381946cb40b0be7e9a1c2b574e6d2499e23d56fee03f11689124e340fce1fffb78fb5f40461103138486f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c6e90e15a5d2c0b8bfd153f6393c81
SHA14302be9bcffed20f299e39c5a04e03de3d3266c4
SHA2568074106b65fd6b1e51eacd65307e18442c2d7fd2c761f25104074c41663c2aae
SHA51266b0efbbaf6b2e5e91965170fd7a028116ad01d31ce40b4fab5b7cb07208c6b6829003dbeef752fb3dd3ce2171f983a2ee95507962975b760ac57c7c5bee72fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c252234e4b04043e6b38dd79b0dcf008
SHA14c17c488dd5a18d4e76797ccecbf0ce891b14714
SHA2569b87836ff7eb073cd173d349517c04b0b927ae4cebc5e99081d367f7e516c4c2
SHA512358983beaa43eb056a374f8a02186b6c66bd7f347955cfcc208f34a311ae386ae5f4fd1ec7d4fabe31063ec664339bde05cfcb34b95690f69c4f9d51dc85d806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748ed5374416d3344409fb3bc6080d81
SHA1e9ba7c5ad3008897a5b5ada2c786af05957c656b
SHA25615c2909ac09d613c333380756e2fc07d947f74a7ba38a0da2ba4056755604369
SHA512fb741fbf34fec8b94d9c9779419db561ebee7a7668bbe088c4733c996b282b7a6935a33c4827f0da48e029f3d52d740408bf5bc0795564f72a06df0cb039746c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c9d3ba475879d327853aac78580e0d41
SHA148a36718d8f3707885881cf19b55efce6b755516
SHA2563a69cc6cf5fb6763ca6dba3c20802a495f95e7cb629e6f5154e59050796031d3
SHA512fdcd413b42c8de5359d061a84884034cc1809984256ddb1aa207f39c5536ea1a85134050e4eb40a0085c5a0c9b2adf6567cab6111c3b5d0e415ea01c935b303e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06