Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 00:55

General

  • Target

    CyberGhostVPNSetup.exe

  • Size

    127KB

  • MD5

    fd093f3100a56b710c50d41667da7e2b

  • SHA1

    5ec9063e4380f642d2a551da76fd4d3f00fd4c96

  • SHA256

    f6dfae75fd23c0446ec1721994cf2530c66bd76366423176414747b39153bf58

  • SHA512

    d3daebf6e3669a4b2a944e60d97c86fd31878cea66e252f05ea8d23f92c1f02ef8e6f4dda250b979a9b9df3fa71dc43c4ab98e2cae52e7687861d1e9a3dd09c0

  • SSDEEP

    3072:ACNd5JY06+ywjDnJShh8N7JNzFrxO/DLxPO4GV:TNVPtVQ7LtOz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Program Files\7a5b54fd-f883-46fe-a3b2-8455044557fd\81d3716f-204f-45bd-8e3e-26110982dad7.exe
      "C:\Program Files\7a5b54fd-f883-46fe-a3b2-8455044557fd\81d3716f-204f-45bd-8e3e-26110982dad7.exe" "C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3892

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\7a5b54fd-f883-46fe-a3b2-8455044557fd\81d3716f-204f-45bd-8e3e-26110982dad7.exe

            Filesize

            5.0MB

            MD5

            72540194bd451dac050609406eb50a56

            SHA1

            57c33ec10f90f81f6abc612b4d251510c36ebd6b

            SHA256

            3a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74

            SHA512

            ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444

          • C:\Users\Admin\AppData\Local\Temp\Tmp1539.tmp

            Filesize

            2KB

            MD5

            647f843626b023aaaa748f924f95ac25

            SHA1

            652cacf99409e3dcd39b6eb8839c16d22b1800e8

            SHA256

            732dee732e0261afbfba21eca43008a5009cfc9e4c405ece8826a9746564cceb

            SHA512

            61093dcbe07efa5bdffec4933243168bf40b8159bc5a9840552bc3ea8e7c129156276a8548c658e5267bf0b8c4448dcb5c8ab10140c72ed48eb8910c075022fa

          • memory/2960-0-0x00007FFEAC103000-0x00007FFEAC105000-memory.dmp

            Filesize

            8KB

          • memory/2960-1-0x0000000000190000-0x00000000001B2000-memory.dmp

            Filesize

            136KB

          • memory/2960-2-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2960-3-0x000000001BD10000-0x000000001BED2000-memory.dmp

            Filesize

            1.8MB

          • memory/2960-4-0x000000001C410000-0x000000001C938000-memory.dmp

            Filesize

            5.2MB

          • memory/2960-101-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB

          • memory/2960-100-0x00007FFEAC103000-0x00007FFEAC105000-memory.dmp

            Filesize

            8KB

          • memory/4908-67-0x000002C2339F0000-0x000002C2339F8000-memory.dmp

            Filesize

            32KB

          • memory/4908-69-0x000002C233A90000-0x000002C233A98000-memory.dmp

            Filesize

            32KB

          • memory/4908-54-0x000002C218690000-0x000002C218698000-memory.dmp

            Filesize

            32KB

          • memory/4908-55-0x000002C2328E0000-0x000002C232974000-memory.dmp

            Filesize

            592KB

          • memory/4908-56-0x000002C218600000-0x000002C21860A000-memory.dmp

            Filesize

            40KB

          • memory/4908-57-0x000002C2186A0000-0x000002C2186AA000-memory.dmp

            Filesize

            40KB

          • memory/4908-58-0x000002C2329C0000-0x000002C232A60000-memory.dmp

            Filesize

            640KB

          • memory/4908-59-0x000002C2186E0000-0x000002C2186FA000-memory.dmp

            Filesize

            104KB

          • memory/4908-60-0x000002C232B50000-0x000002C232B96000-memory.dmp

            Filesize

            280KB

          • memory/4908-61-0x000002C218700000-0x000002C21870E000-memory.dmp

            Filesize

            56KB

          • memory/4908-62-0x000002C232CE0000-0x000002C232D0A000-memory.dmp

            Filesize

            168KB

          • memory/4908-63-0x000002C2328B0000-0x000002C2328B8000-memory.dmp

            Filesize

            32KB

          • memory/4908-64-0x000002C232FF0000-0x000002C232FF8000-memory.dmp

            Filesize

            32KB

          • memory/4908-65-0x000002C233350000-0x000002C233358000-memory.dmp

            Filesize

            32KB

          • memory/4908-66-0x000002C233950000-0x000002C233958000-memory.dmp

            Filesize

            32KB

          • memory/4908-52-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB

          • memory/4908-68-0x000002C233A50000-0x000002C233A58000-memory.dmp

            Filesize

            32KB

          • memory/4908-71-0x000002C233C90000-0x000002C233C98000-memory.dmp

            Filesize

            32KB

          • memory/4908-70-0x000002C233C30000-0x000002C233C38000-memory.dmp

            Filesize

            32KB

          • memory/4908-53-0x000002C2185D0000-0x000002C2185D8000-memory.dmp

            Filesize

            32KB

          • memory/4908-72-0x000002C233D70000-0x000002C233D78000-memory.dmp

            Filesize

            32KB

          • memory/4908-73-0x000002C233DF0000-0x000002C233DF8000-memory.dmp

            Filesize

            32KB

          • memory/4908-74-0x000002C233F50000-0x000002C233F66000-memory.dmp

            Filesize

            88KB

          • memory/4908-75-0x000002C236510000-0x000002C236518000-memory.dmp

            Filesize

            32KB

          • memory/4908-76-0x000002C236520000-0x000002C236528000-memory.dmp

            Filesize

            32KB

          • memory/4908-77-0x000002C2365E0000-0x000002C236618000-memory.dmp

            Filesize

            224KB

          • memory/4908-78-0x000002C2365A0000-0x000002C2365AE000-memory.dmp

            Filesize

            56KB

          • memory/4908-79-0x000002C236A30000-0x000002C236A68000-memory.dmp

            Filesize

            224KB

          • memory/4908-80-0x000002C236A70000-0x000002C236AAA000-memory.dmp

            Filesize

            232KB

          • memory/4908-51-0x000002C232710000-0x000002C2327A6000-memory.dmp

            Filesize

            600KB

          • memory/4908-95-0x000002C2386C0000-0x000002C2386E2000-memory.dmp

            Filesize

            136KB

          • memory/4908-96-0x000002C2365B0000-0x000002C2365BA000-memory.dmp

            Filesize

            40KB

          • memory/4908-97-0x000002C2386F0000-0x000002C23872A000-memory.dmp

            Filesize

            232KB

          • memory/4908-98-0x000002C238730000-0x000002C2387E2000-memory.dmp

            Filesize

            712KB

          • memory/4908-99-0x000002C236AB0000-0x000002C236AC2000-memory.dmp

            Filesize

            72KB

          • memory/4908-50-0x000002C217D20000-0x000002C218230000-memory.dmp

            Filesize

            5.1MB

          • memory/4908-49-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB

          • memory/4908-102-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB

          • memory/4908-103-0x00007FFEAC100000-0x00007FFEACBC1000-memory.dmp

            Filesize

            10.8MB