Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
CyberGhost-VPN-Crack_mWG8uTgAlP.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CyberGhost-VPN-Crack_mWG8uTgAlP.exe
Resource
win10v2004-20240508-en
General
-
Target
CyberGhost-VPN-Crack_mWG8uTgAlP.exe
-
Size
5.6MB
-
MD5
9b4c85945e411d62c12049aa3379a772
-
SHA1
159b79d8da67eed91a7bce169d4454624d55ba18
-
SHA256
3d6aad0baca821ee45ed104ae5fce1faad69bc4eea3c7c9d9fd3edea3aa57b8a
-
SHA512
1055206cfa669ee01d943413c9359d4ad875a7e762393d5e56cb4c134e65a371cb5a8e45deb9aa35493bf510a0ef084c6d36b776ad8108f6d5dca65d94ad73f3
-
SSDEEP
98304:tIm8jpCMbHIBdbNW/xE2ha2PHCYLEatQQ5Rf26yYQkKWqmiotDFwAzC0PTtcGoZV:Wm89CMTY+62PHbm0fR4lW7hwAzvPTtc1
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 2924 passion32.exe 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4616 passion32.exe -
Loads dropped DLL 2 IoCs
pid Process 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3088 4616 WerFault.exe 114 2476 2924 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2052 wrote to memory of 3720 2052 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 89 PID 2052 wrote to memory of 3720 2052 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 89 PID 2052 wrote to memory of 3720 2052 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 89 PID 3720 wrote to memory of 4748 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 93 PID 3720 wrote to memory of 4748 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 93 PID 3720 wrote to memory of 4748 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 93 PID 3720 wrote to memory of 2924 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 94 PID 3720 wrote to memory of 2924 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 94 PID 3720 wrote to memory of 2924 3720 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 94 PID 396 wrote to memory of 4872 396 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 112 PID 396 wrote to memory of 4872 396 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 112 PID 396 wrote to memory of 4872 396 CyberGhost-VPN-Crack_mWG8uTgAlP.exe 112 PID 4872 wrote to memory of 3232 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 113 PID 4872 wrote to memory of 3232 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 113 PID 4872 wrote to memory of 3232 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 113 PID 4872 wrote to memory of 4616 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 114 PID 4872 wrote to memory of 4616 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 114 PID 4872 wrote to memory of 4616 4872 CyberGhost-VPN-Crack_mWG8uTgAlP.tmp 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\is-8RRPG.tmp\CyberGhost-VPN-Crack_mWG8uTgAlP.tmp"C:\Users\Admin\AppData\Local\Temp\is-8RRPG.tmp\CyberGhost-VPN-Crack_mWG8uTgAlP.tmp" /SL5="$7020C,5599109,56832,C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "Passion_6102"3⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Passion\passion32.exe"C:\Users\Admin\AppData\Local\Passion\passion32.exe" 33b0fe57ead94886b8fddaf4471730813⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 8484⤵
- Program crash
PID:2476
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2860,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:81⤵PID:4416
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\is-6TEDL.tmp\CyberGhost-VPN-Crack_mWG8uTgAlP.tmp"C:\Users\Admin\AppData\Local\Temp\is-6TEDL.tmp\CyberGhost-VPN-Crack_mWG8uTgAlP.tmp" /SL5="$402D4,5599109,56832,C:\Users\Admin\AppData\Local\Temp\CyberGhost-VPN-Crack_mWG8uTgAlP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "Passion_6102"3⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Passion\passion32.exe"C:\Users\Admin\AppData\Local\Passion\passion32.exe" 33b0fe57ead94886b8fddaf4471730813⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 1404⤵
- Program crash
PID:3088
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4616 -ip 46161⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2924 -ip 29241⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5b32b3e4dff5a38135fb4b6eca7db6060
SHA1c68e59f3342f39a68cab627665acd4a8e18c2516
SHA256c0eeffa6eba75c15db545198903f9d7536521762f7d55dc2ba6cab8f487919fa
SHA512f62862e6c71a749d4ee7c0d30edf9a0c0abd05cd73b8ae5e5862678e8b3266cde7c039e29956953ee94d43f2db2fa2025919789d0e4afa236047373ccbd80126
-
Filesize
781KB
MD50303b15a536f0383aecca1737e6e2d29
SHA1001eb9623de95cadd4f8ec2ff1a571fb649e0938
SHA256e788f9d007f9ceb41616b0b1165ffb94c6649956b8873583fee5bbaa5a1ce94f
SHA51276979e5e4ba68dc23746ab2ff2a7dbf63f12d5abdcdaa2925fce9ddec2d78e6e46d073b6199a11cebd57994624ac344b4ab0d1c24850e8749e03a49d3943fc73
-
Filesize
100KB
MD5ab45c071f3c430ff80019799b6c49fd5
SHA194f429c76a3e7e2accc850e492450fa8904eb1d5
SHA256ef4db92010d70e632296ac93ad0f2bbc3b1b3098ad397a5a4f6e134818530305
SHA512052f784d20f4a7b0a9f537384d17f00823ba805f811c57c2b7b2ac8d5c38ade005df2d4ee7daaebe76c5fef8aee1ff5acfe49e80094033fee422b2bb5cce13d5
-
Filesize
1.5MB
MD5a81f5fb9cec6a8ab27128e741bba8168
SHA10cb5fb7ed33b5cb418fa679175e87e70cf1d8ee8
SHA2568bf02ebcb732d23c94529a0f6b8702f82bf459fe0e1dcd641b404884ca41db57
SHA51210424d30eb9ee79695b93168c21793989b2f5158d120e72a0a595a5bc48f1a67524f726350c7d36c4d8c2ae1d5659cb7dbd190f052da8f4f0ea051ab69ea166c
-
Filesize
327KB
MD5c1d465e061d7d02895daeb19bdb28ac9
SHA15e729ee51df080545c7031d771b85094a2b2d4e9
SHA256777917d30f277a9e88d8fc04e69b955a2b0bd3f2bcf2e36f7f9cffef2583ee60
SHA512438adaa0ac3ad47621d288e3ff56493cc7de4e2a89fc5420e246a6045db79e7cb84a28d3f3420841340ab33bd632f12fdc3a4e9d8ef99601ca9f975b7f8309e1
-
Filesize
242KB
MD53eb507cdda6010014e2a692ff2a2a008
SHA118738dde537e7b77fa57b4f7a564679a1f92d16a
SHA25620ab110602eb79e2039f99fbafa16fc1c8a436002022916e9bc586c35fa459ea
SHA512994350cbb3fd7fe9caa5e34977b1c181295d23c23c658f286f71cbc7b72130b67f9120ae76b97801eedc3f86c353a4416ff694303c33411e9abd41203f1d75a8
-
Filesize
349KB
MD579ff45559fa35e9b48ec486652010d09
SHA135586c0d8bcd3c738459ca9c0dba8d167169f349
SHA25600a3cf7f2fbd4acafe749bf65040328bc67165dbeae6f8f629d7e27202ed9844
SHA512a9a7d4173e1186f9b8b665b2c7908717addfc427853716f2cc21c52d60228e60e655d4e4bc29a16f0a63a47f1b605224299b35ad16192b1bc314ce0e26eb3dd3
-
Filesize
194KB
MD5a2c7c70e326fe148a9ba33dfdb828ef5
SHA196805ee9da4d083f76a113f73f9078c096ba7bf5
SHA25607013a57cdb1442eee6ce699a11265555944ce56b587c888910c09b610d18a23
SHA5126ccd470852d3f17200116b7f72be035223fb1d46a52acf119f1d6969c816fe75bab1f63cd93bffbba83722dbfdda03bb8e92544dfabc333ac53131dbd5dd8d6b
-
Filesize
253KB
MD52c7b9071cf540794c209d3b87a29a0ec
SHA16f64a3fe1cdbc6a2b51cb698a93402fc683de320
SHA25685cc8a03db59c4e6a0c39a9b5e3d47633a06550863c4f4175a77e25bf00c647a
SHA5126a9075de9dd1236a5b13ceff1831e6c7b7a9166c588bdcbdae54193e59ff9c8db504af67f729e013001ad81cc508690fd22e4818ce58dbde7dc4a3b8c6bdba89
-
Filesize
123KB
MD54b2db8fa8a9b55bcbc02f29f12c93f93
SHA1b4c149c55472bebe10694e6b82758bdf4c82d05c
SHA256e97acb579d51036311484daebf6ac10472db603c2ba405e8de32eebcebf3f925
SHA512f314ba3bc256d8d4258f8565fe8f11f29bdcdedcb045696cc94d007ce0f75ad155f679fd486bcdd71a156d097706b8d59f61ae3039d770ad31b0a53820d1a63d
-
Filesize
268KB
MD5eaf7ce27554bcb5500611351b344b083
SHA1c8bee7c36a8bee1d5b6af62af3ab760d5c09f1ed
SHA256a4b45c536fc0ae58d016b3726d2eeed8a45713a6ec527e91028af48f04c9b30a
SHA512b76888d4c64a1b7979f5b019437421b5e29b48016658e058ff7fa6a67b8e8fea69f3536db509627f8fef6fbf56335cdf415d2da908505b61f48dde98cc7fbc18
-
Filesize
278KB
MD50a5c212b63615b99702d1bf133953e8c
SHA158ba5fe581dbb2204768facba14e752aec79098a
SHA256f418ad194a04cdde6a705a213f7a7c33e83251ee21d22a1aa535092ab63d37b5
SHA512be9bd72768c5b2bcc8dc271a91bc213493b5f017eb6809394840759c7cb3b3740c58a002ae437ae115d2d8f7074ad46287e7755c2b2d2c4c0abf91bd929319f9
-
Filesize
32KB
MD520d7a6cfb946b22a816d92ed57b51ce5
SHA10af25d85e631e96f49ac9772301726ee78e0823d
SHA256a51efadb5492658449d095079e2d53808a045341edc6afa453a9536e61b2fa3f
SHA5120a3975a9032dcb18a06360752d4f39a74c2e82d6e0e77079c25e7d4cc03d9ca12af26ae04208af306edf9986552be456cff26091d4cd1286ca5fff3ca67ed3f5
-
Filesize
241KB
MD524583405f8bcfc26884f221a2a9eb0c9
SHA18dab67860832bcb9ca9a99007149f6d7d6dac303
SHA25628f7688622dc5eeffe960b7d906a2fe800ef4ef2654add389aa84ef7c6edcade
SHA512c39e14619e6a225baa5cc6b110bdbcfcdc2f51ec76413d6ed302b0faa2daeb43bfea2b290936665a76b224ffb5d8822885581f02b533a6b052fb39f7f10b730a
-
Filesize
117KB
MD5fadde43c97607e4445a6f924d851f04e
SHA136c1aa0e1b6d4a322c350f5e502c10c64c203041
SHA256f0614835136413217ed3baec9ba22aaac4c37956afcb0209f1f89b7676ae86bc
SHA51266f5637419f88070838ed522defad9aa1b46dd4fd8cb045e0292742831520740d152795b6e99770f34061db596019ef3a342a956b541180e78d1c48b2703f42c
-
Filesize
1002KB
MD5c283d446b34e75019b81d0981cb11f0d
SHA1a6e146975dfc55b0659d09e25b9a69f7cff993dc
SHA256f6530962659d0641236a42517a30dc55c4fcb7d30e942c3e820af343798a770d
SHA512eb51969a79ee4501c955a81cec9f07e9a39007c1ea69c5021e03ebf3b640d949e19f6e0cd7af969e80ec60ea6b8477804fb76deec2704db503e72906103fea63
-
Filesize
48KB
MD5d128ae39a79e5d196fc001907b5ec3d1
SHA171de74d0aa93903e0a169c88fd21e0c617f0660a
SHA2564195ac1e3a4a8056de42c31d511e0e595772439adba96180b8953ef5f135f7a5
SHA5125b32eb7e2f01fb17ed0c4434a525ae3056acddde75c32c5036c18b6f2ffa4cf80cfee9bab4c824ca313e6e33114ea0e761dc8f75db3bbbbe4319c079848a3c06
-
Filesize
3.9MB
MD5e9204a64fe0a819f7ffc0267d3c2061b
SHA1e667de9be231fe3d63ee5d7fcd824da5b1d211ae
SHA25653eea7303b5beb7863431dcfc8af84baa40511625ef58f9891540055bdc74283
SHA5129652ad6781558b7f525ba17c6c2cc868fd16cfa6772ae1f03a8e398a469ef864a626883dfc585464a6127e56f524386b2d183bc9299fc80dc3bb18444c391d68
-
Filesize
31KB
MD5b747471f055b61bca1c77ea549ec3db6
SHA17421bb89c50e52d45f3baa8a3e789ee3d6f18cf9
SHA25619c2a0f8dd954fe7a3214b4d850800df1bbb80ededcdcc233783e6052bd1fc51
SHA512cf7e5f81e062864feb8bc6767779094f08a94d7816203302dabfc88df2acf75e7239005f079eb5fa81991255636a47f977d466e5614a909a10c260eee45b4d9e
-
Filesize
654KB
MD53acbfc4441bec4891a6d11f7695a189a
SHA128843a7ff8379feac622e8f0ede50961da468bd8
SHA25672380b2cec8d7f403ff991638caa2b9b231890e9dd8208030662b707f580aacd
SHA512241a29590f6be539e07ffefb04d8c79fdea0de35a23c3bd51f25bd1f16e87ebf6a9418db51a36772ea87fbccc52866ac785cc6e3b5ff40a653095c76a8af4851
-
Filesize
1.3MB
MD5bcfee6b4161d9bec56bf97634a9b9c2e
SHA13040622dbc625dcb8be6ab2ce2405da157e44c35
SHA256e09ca14953574cf748a96596242ca415c1fa8bbaa4997aebb698e8ca8b1e518c
SHA512df97bd1ab2056c6c13d059a1eae372b2c4f0ad6830ebaf2b88640e00cfdc6081e7e3647fa267886cf501f8ee89c00f6354332c172551dd56b6975b32c6002a8e
-
Filesize
43KB
MD5802b73d63d6e47dfc5d9a7abe51bb025
SHA1ec002f4145a8d860a996294d6b4aa24d8910abee
SHA2565e2a3b61393599618fc306769ac955cde94409b76b71fc8aae528de2b2ee68b3
SHA512c2e91574b82721d12589ea3ed2b2171a43a8f0068079793304bf35e508a405bfdc84c64d5ba6d538fd710f634483016461bb1fde9d4d8f08be8b4d62bcbfb2ba
-
Filesize
48B
MD53bb131d6862fdb57979f6c859c7af30e
SHA1e7fb2dbd1f76a1f53f00b03dee50f7fc88cc244c
SHA2563f63cc3979f035e87c272f895b24b107ace6a9265ea362a49ec823f333693d14
SHA5125545e5fe744818a49aded5451a74d63cae091e6e95eb0e94738454ec19388546191265b5526ebff0a07aeedd73102d6b5ec0ddfe1122014597b728fb2e17d41d
-
Filesize
270KB
MD50e42fb7c0ad61d48bea2488c0c88581b
SHA12bfb621a42e3c12af442091b246ce4ca7db7b070
SHA2565f983e8876256fc1788d389f6903d5a60742fa27a0613d569efc9105ed524313
SHA5126e6c27a3e61ac47ac0b4603493017427fde9b1ef7ce678302c1451bb5fe7ad76fb4cbfd3384ec68da6bb1bccb2cfb3d2e998ff8a24fc1b48e55ef048bf4109e8
-
Filesize
6KB
MD57780489f109af07b47643bd7565d2995
SHA17cb3a11c5bf1e38731e604c522f80b64110f7eb1
SHA25618b3649a6d455f689a6cfb7c08fb80b8ee0da441950094266f40cc174593f229
SHA512f02afc31edbeb455cfc4d7368e244c5f2a6c176e66bf65a0af375f76e3c7450f7507b388af92d398e08bdedf20bc17b64144179afc8813b2681a10ea04e4b76d
-
Filesize
705KB
MD556d843daa7901da689e2e4c01091a6fb
SHA1bd244ee91ed846439c251569e8c5fa94df112bd1
SHA256655e2508a149c039919894bfcd2ed4db858f4beee6e3e7dabaac325637cec03f
SHA5123a72e8f3a772fafc49222d7f580161d154cceac3370fee6c7649e5a0e680a810fd728167429a72e3320ba2dc8ab9f0bceae4103d85ecc976cb3a454745e2a5f1
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
694KB
MD524821fbb86a16c230a7073128ec09c42
SHA1c0e36eacccae638da83ad1587ca3d4df4fa6558f
SHA256e775e1905fdc27bfc4cb08a8fecf98e745b902920350556d366f36497114aeb8
SHA5124836a09c0adf4929be7bb9ecfdad24d90ba2f8b650b1a2d99526d48a79aeb281709bbd47a852a8f8c20089a9a693ed42a693d0aba28c1add3a11433d63d36792