Analysis

  • max time kernel
    69s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 03:42

General

  • Target

    Ghost Stealer/Ghost.builder.exe.xml

  • Size

    163B

  • MD5

    dccd44fb11b8e4ebdfb822e809a54b6f

  • SHA1

    1889d5ae8c7c70c051cbde104af6e0f31f8c1b63

  • SHA256

    6862b25736259f7bfd344e43eea10a703885be381eee2a745ceb12916b01a158

  • SHA512

    dadffe41bdadfc3a79cb34369c9a8b37ce4833aee18058b02dcb13d64007f022b80b63ab404572c60278937cf83b06b00712ff9ee302e725b9d5c7fe14bd5f50

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Ghost Stealer\Ghost.builder.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddf4a69bad1cef8a94335907f5fec3fb

    SHA1

    794df52644d0917e0e664a80ca37213c25c64800

    SHA256

    2e0a0ce9dddf3daff1b90e59f1c8f6ed71976c32d70d065e3269addd5d5548db

    SHA512

    bc639d76af5066b6627024f1e323b0b1826f8c417b67ce9b49bad86caa5fc223b7e7729c24eb6420d6ca7e639dd9aefa4ae4e98028bd91221708bd18c36a6bbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df0a4bc86bc6bf4c4a8dea660045d3e5

    SHA1

    9a9e3a820768b16d41f9779f9660ff774b7236b4

    SHA256

    2d15dd83408d68c7d66482dfc916ce23e10e29ca5b8a7325b4f88e7892eb9449

    SHA512

    c6af2c8f6c2af8b499ff45921d134adc9138a9e9b60060dd58b4bdc5799fbdeedcc3ba29880bc83bbfb36aa4b4fb9bdd5fa6336a7ac9952535950c8dcbaa9ab7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0bf45045de6145dd14f0fcb636a21ac

    SHA1

    6041f89bd09a52873ddd1e72adcf327c05bafdd9

    SHA256

    fe17020f5e7dbc84c9274d41b36ebe2e563e177cfd348df2a11e197dde3e5c84

    SHA512

    297704b95ec294558574adaabdc39b5b17bce529d6ed6dacc29d03b9a4cfece018c63f81f09ee053ef1f082d90882df94fba2572ee8152e24f1bf10a54e7cb02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22689a298ecbfe70a09a6da4fe441a3d

    SHA1

    a2cd0abedd0c0d7aa4f58bdadfafad043f529245

    SHA256

    b28f75f94abf261295c280e27a263e14b3099501bff57b96cfbfd634a64a69ee

    SHA512

    8593fee353f9c58adf79a0f6e9984a2c7d895bb1fc5cd5fc3ad67491a0c1f6cfde0c910d67778ca783858697ddbe75ee4ab742b075f0aa20aea26f9213e93770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    907a84dd226a71062f7f951ed9a0c636

    SHA1

    6f0b256c7a48f342f9f329a532c32527f0176e8e

    SHA256

    074d18c3eb8dc3bb0cd8b8e7d875bdd475acff4057c85c593f387b1ada2253d3

    SHA512

    6e7e204a8e77faf3d48bf89f4c24caf7d0f29c0f4902bc35943441a58fb06ba06b7d96e8845b7032560adbffe09681811d6cab9c8719aaa5c88c37e449dec4c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6937dfb31b4bde0121f13700edc06ffa

    SHA1

    f6d83056b051e2b1602565d7a8648164eeda9f50

    SHA256

    2f276b2783ae7bd066cce4777236335e732b49b760f51921f833b25a599546d5

    SHA512

    862d7cdc73854109b6e80a59851e146afd73e81dbde7471a35249671dddb38faccf42ac97e1b1bbfbec7d4e8e31693ac0287725a144e57088a640609fc55000a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff6fdfee5ec0551cb4caf1962ad4afe6

    SHA1

    d23a0c646acc276ba535032c46fc0958c594b830

    SHA256

    5b2ef7e5e2a672b9c40502fd0484ae286ba4461acba4ad58bf879aa733bba1c7

    SHA512

    36fbbfe3a5fa5b1bfdee5c26362ceee035c4f58ed73483f1cfa1fb64cdb135cebb86b5fbe70d5ce432d072f61df830a7eb3b177c634493a29929919b6ea6a452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adbfe288e42941f030e16e8c57344b38

    SHA1

    ec904e0f6ebe3d251c70b6bb7c569cfe7ffed928

    SHA256

    9123cf5196175ce8ce891c6c6548d83b26ea22db2005826d8b2c69b06a3c22e3

    SHA512

    b404466767d16056255caeaef337d1a863ed5064cd5329d867092e8739a1169040c177a68c7223e753eced72b0378e8c175db8331d31b1f44ee3790012465cdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f84d8d1decb34bbb7945f661f598c0a

    SHA1

    1bb96b2d140fcaee04d29ed79cef031b59f907ac

    SHA256

    dd6bdfca2c3789cb7f10a1421390f6246056e254560dafe505e60d7b6e6dd2e3

    SHA512

    b3b909889291077f45f96f604900102b585d430ba837666075a7a8854bab8b2436b4390f60bacc0f600726dca48c0392317ad8b4032727db3cbb7b95b3ca1abf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    488a3a85dd2ad91ed07987b53d917efc

    SHA1

    064910bccec4190188bda8483f4eeea8582c6b0f

    SHA256

    9e4c883cff6c5c4e6d6d64919876b04c37b7596f2f732fd130dc0041cfe0f2cf

    SHA512

    211e12791c657a331ef8a974e45ce9390148d965edab29f1c7ce2bc3291f27d873c2902bd5658a7e71d311c4aeb9a1672d9de4e12376dd14082cf86eb3f6b92c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2037c792931cfa825976b9175e226c7

    SHA1

    511b30bca69dca691bd50408578d95e58e96f5ad

    SHA256

    e44dfe9c398c857df26cde9c222133c4f14f74d09949759b02d5e4cf712097c3

    SHA512

    7d4e6b4fd0a41144316ae6c6d21f0a8905d498842bd8a8f2dc517e5c5db48594b87169ff4a69c6c6fd814f07b894a10bc1ba982f66301458cfdc8385b2540b80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f72420c0bd5ddf3d05968c942234052d

    SHA1

    ef0fb1240b9e95cd78d4852ef1ce42814a4b757a

    SHA256

    c81154e0d861e7659ca81acef17ea744693894aa0240cf27a70021632e4fcdc9

    SHA512

    dfc5347abd964d395973559e967005faf9467c343d4a6994fcbd30624c0ad9fb467b97788afa29b8e3b98a2e301d08914dc7c1da5d03377b462109157f1b5926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7106ecae1b48df8a4cb74aac6a1eff96

    SHA1

    c86b5573abdc275e99785b7e0931e6726c152b3c

    SHA256

    56a12effc9beb748a9a06f3f82070a992d0fe5dfc7f901a656e632a6d03b5508

    SHA512

    fd04f2e662e55cde74f4de393762b9c81f35e8ec57160f0700e897c28eed821001b2720e82cba8c1f269d37d7152ff4cd35c905afde206405972505b68960c9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7691bb79e48d548eed7316ef4eee6bc

    SHA1

    f54aa96d7820fe34f4ef4f9124aaeca81caddf9c

    SHA256

    75e4f869dd5f2cba5c6afaccc3e2d5a34df13270456dd3f41e7fb886d79e0209

    SHA512

    cae9e1476c6656e2b6ce0f7dcec31bfd094798bfdb0c2a13f570d4e7b27e67fb2e70e0e837679af0005613772e923f3cb793164a607fff90d84e073bc64e9461

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d680c7f3c57ae055070849d87f3f1d1

    SHA1

    1e07c97e2f4db196d4e5fbf8e349fa55784941d3

    SHA256

    fe79da6075afc24a821f51b2a06f73b9afc04183735c9f160bd3fc5b2be6686b

    SHA512

    b1766bef10627542b8cf5fd73d8892a6ce72bce5a1fe134475b3f6a90afe4299271123a19dc1f06e1e0f475db2b4a886a3b7ee1848d8ac8db3b019e2da07565c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcb61e3a8adaca14e00b6b747c76633c

    SHA1

    1da13e24738ce1ddf16e3258f7feb23ce8b144bd

    SHA256

    69c4d6f065f9a16e5cd930b3076fbd6c66067bd38115f696aa26befe577de67e

    SHA512

    56a69d8223509dc2418d5fa19f0504cdb2450dfeb09bb776d563bf9248a9cc2b1aebdc3ec02699a92d4955eed1ebf9b2f33ba61f009b10718faaa060200e9f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    956bdc8a86cb9dbe1e9f70f324edfcba

    SHA1

    866207e09e44ca997b3d6ff9ca32fc300d9f2ac7

    SHA256

    42468f1d42d8065f0eb2ba1b3b689262dae00c351a6bba0e7590e2349eeb18ee

    SHA512

    0471ab8bf13c2d91fbcba5f3c56ed4ccd45728715f7574279353fd206253c3527193ad2a2e9417ffdd6f1721e1ed0e459d6e3e491b35b90b96dd9f45c7cdf584

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fedfcf71a2ceb37e971e6ccfb50460a

    SHA1

    ca8e6e4736da427e01f0476256c743e14640804b

    SHA256

    1652b8e4e8946862bfe81878553a71ebeae07c255f60225ae7f838b1832bd409

    SHA512

    898268ba44d45f334cfe49bdac78d4962ff8a4d32b5478a062a5a3641edee4fac5073695d1c2b2bb963de91319bf5cacab6c5ce371a9fd708c1a0ed2e54c89f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20acab8c4af0ff3d4382fd4c59216e15

    SHA1

    d3450f5504760ab79203b95eeb3104e48796c8b9

    SHA256

    17fe7e7dcdb4d0c4b9938cdc4f43b7e8f892b9d2874d762cc6d1fdd961b064b3

    SHA512

    fe574ef184ee6f687d3c6e4ffbb6ab3a0a3600df0e8e4f6e517d763880277a883dfeaa362c5e47b5b5471f4a3ea2950abde8f3183dedf59294280726d4ace946

  • C:\Users\Admin\AppData\Local\Temp\Cab3AFF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3BBF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b