Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 23:10

General

  • Target

    Ghost安装器.exe

  • Size

    4.5MB

  • MD5

    ac33168a21c93cae0af18edcc477baa0

  • SHA1

    5ba450393e08eaa748a9b03e7bd191106b48a30e

  • SHA256

    020c3fd01f2802b258becf7411c5d76b405d685d5ec26c1fa7e03d22a052d23b

  • SHA512

    a5c632103b2b455ae949406a9b4edca40eb72aa9d06bc59f8d290d837b76768422467647cad78619492e856fc871746bf8c07bcdc9e0ccfc1701e273d1aad026

  • SSDEEP

    98304:XSxZuGZQ2rFDZGagdFKrV+9d7QAbzEK77BJ:ie2rFDQbp9lxzj7VJ

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe
    "C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\DSPTW.exe
        DSPTW.exe /a /pdr
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        PID:3060
    • C:\Windows\SysWOW64\SHOWDRIVE.EXE
      SHOWDRIVE.EXE
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      PID:2880
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\DSPTW.exe
        DSPTW.exe /a /pdr
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        PID:2860

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DSPTW.exe

          Filesize

          23KB

          MD5

          c3429879521305de064a0952dab5eb6a

          SHA1

          167e21603daacb16801e0e3cc1693d2da4d65cc4

          SHA256

          9f8439a9217a1f1e2aa46e611a8e38b591500f986c484ec179cfef712cbff707

          SHA512

          be10440e7a805c5f28e861a0e71633d7bc3f68947218ba707f3a7d43dcb2896a550f686944fe4cfc2328e9d0bfe63c0c81da2bfd64b45c576e12d7a13480e266

        • C:\Windows\SysWOW64\dspt.txt

          Filesize

          158B

          MD5

          2170a3016bb3ad550742ca6acccc7c5b

          SHA1

          d2d180eee47f716cf6765cf688d75044dbc286ad

          SHA256

          8188f92adc8aaa7ff3eb988eaa53d3ac00c42a5c4f471d7dc2f250dc2dd6325f

          SHA512

          bb14fd76a693948b1e13fb6ff657c006acca6a56a904bc0ea851d3e5bb4806615257308ad2c8ca43c5041da4b6d053fb6d78c8f2839e7461f8b078169fc90d44

        • C:\Windows\SysWOW64\dspt.txt

          Filesize

          202B

          MD5

          e9fe4eb013f8ef7b6225b06acbc11eed

          SHA1

          6652dc969b3b464fa2222ded0657ae01421a810d

          SHA256

          fafbf7adc117c5a06e9404c7d6c5311261ec3fad17ae2c011b8d622cce899f90

          SHA512

          9330f4a16f1668b6babaa76a2f84c4289c32267820f1a07b483407e88100f0eb77e8d8e7e3233e453aafc752ee858ef474564c3f315be89d3b8de0449362c958

        • \Windows\SysWOW64\SHOWDRIVE.EXE

          Filesize

          28KB

          MD5

          9dcc76e36021f25312903377500566e2

          SHA1

          c74d638a38e3b842b8a06958e96b11081de8d1e4

          SHA256

          c1863cecf48d4e0dc26326081a6bc6d6975e86d9b395fa6e49eaec632ad1c5b7

          SHA512

          ab751b0427ce78225f2bfa686a643aebccad7b60094c27c3a75e80bfc975dccc6aa9ae96761ca218069dc22d4161fb7837a14287dcd9287af3f35e84c2b08c5d

        • memory/2096-51-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2096-0-0x0000000000400000-0x00000000004BD000-memory.dmp

          Filesize

          756KB

        • memory/2260-37-0x0000000000170000-0x0000000000182000-memory.dmp

          Filesize

          72KB

        • memory/2860-39-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2860-41-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3020-11-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3020-12-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3060-15-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3060-13-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB