Overview
overview
10Static
static
3Ghosty Per...er.rar
windows7-x64
10Ghosty Per...er.rar
windows10-2004-x64
1Ghosty Per...FN.exe
windows7-x64
10Ghosty Per...FN.exe
windows10-2004-x64
10Ghosty Per....1.exe
windows7-x64
1Ghosty Per....1.exe
windows10-2004-x64
1Ghosty Per....1.exe
windows7-x64
1Ghosty Per....1.exe
windows10-2004-x64
1Ghosty Per...ry.dll
windows7-x64
5Ghosty Per...ry.dll
windows10-2004-x64
5Ghosty Per...64.dll
windows7-x64
1Ghosty Per...64.dll
windows10-2004-x64
1Ghosty Per...on.dll
windows7-x64
1Ghosty Per...on.dll
windows10-2004-x64
1Ghosty Per...ec.dll
windows7-x64
1Ghosty Per...ec.dll
windows10-2004-x64
1Ghosty Per...z2.dll
windows7-x64
1Ghosty Per...z2.dll
windows10-2004-x64
1Ghosty Per...pe.dll
windows7-x64
1Ghosty Per...pe.dll
windows10-2004-x64
1Ghosty Per...ui.ini
windows7-x64
3Ghosty Per...ui.ini
windows10-2004-x64
1Ghosty Per...16.dll
windows7-x64
1Ghosty Per...16.dll
windows10-2004-x64
1Ghosty Per...rts.sh
windows7-x64
3Ghosty Per...rts.sh
windows10-2004-x64
3Ghosty Per...th.sln
windows7-x64
3Ghosty Per...th.sln
windows10-2004-x64
3Ghosty Per...th.xml
windows7-x64
3Ghosty Per...th.xml
windows10-2004-x64
1Ghosty Per...ilters
windows7-x64
3Ghosty Per...ilters
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 22:30
Static task
static1
Behavioral task
behavioral1
Sample
Ghosty Permanent Spoofer.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ghosty Permanent Spoofer.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ghosty Permanent Spoofer/GHOSTYFN.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Ghosty Permanent Spoofer/GHOSTYFN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ghosty Permanent Spoofer/KA-LicenseKey_x86_x64_v1.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ghosty Permanent Spoofer/KA-LicenseKey_x86_x64_v1.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ghosty Permanent Spoofer/KA-MemIntegrity_x86_x64_v1.1.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Ghosty Permanent Spoofer/KA-MemIntegrity_x86_x64_v1.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Ghosty Permanent Spoofer/SafeGuard-Library.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Ghosty Permanent Spoofer/SafeGuard-Library.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Ghosty Permanent Spoofer/VMProtectSDK64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ghosty Permanent Spoofer/VMProtectSDK64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ghosty Permanent Spoofer/brotlicommon.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Ghosty Permanent Spoofer/brotlicommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Ghosty Permanent Spoofer/brotlidec.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ghosty Permanent Spoofer/brotlidec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Ghosty Permanent Spoofer/bz2.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Ghosty Permanent Spoofer/bz2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Ghosty Permanent Spoofer/freetype.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
Ghosty Permanent Spoofer/freetype.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Ghosty Permanent Spoofer/imgui.ini
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Ghosty Permanent Spoofer/imgui.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Ghosty Permanent Spoofer/libpng16.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Ghosty Permanent Spoofer/libpng16.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Ghosty Permanent Spoofer/server/Certificates/generate-certs.sh
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Ghosty Permanent Spoofer/server/Certificates/generate-certs.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Ghosty Permanent Spoofer/server/EmuAuth.sln
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Ghosty Permanent Spoofer/server/EmuAuth.sln
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.xml
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.vcxproj.filters
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.vcxproj.filters
Resource
win10v2004-20241007-en
General
-
Target
Ghosty Permanent Spoofer/server/Certificates/generate-certs.sh
-
Size
726B
-
MD5
cfbabd8034b1b13e82dc7e9e7de3fd03
-
SHA1
8275a5a285b9248b984209ecae563bf92229c5d3
-
SHA256
a559dcd94b5dc389f518acd1f856e11e3146d1891a9026fb8691ff342836f447
-
SHA512
26213455dd4fb95c0bd67e81146c67bc91dde4894af5a4a9a290b9a0008f22e233a2f5aff04b0a16e2376f3eecf5943c7a8c36c5a690cd6d200b1af2a10291a1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2228 AcroRd32.exe 2228 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2744 1576 cmd.exe 32 PID 1576 wrote to memory of 2744 1576 cmd.exe 32 PID 1576 wrote to memory of 2744 1576 cmd.exe 32 PID 2744 wrote to memory of 2228 2744 rundll32.exe 33 PID 2744 wrote to memory of 2228 2744 rundll32.exe 33 PID 2744 wrote to memory of 2228 2744 rundll32.exe 33 PID 2744 wrote to memory of 2228 2744 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Ghosty Permanent Spoofer\server\Certificates\generate-certs.sh"1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Ghosty Permanent Spoofer\server\Certificates\generate-certs.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Ghosty Permanent Spoofer\server\Certificates\generate-certs.sh"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51317317cd22d478cdc1c4973836e1e3f
SHA13a1f317e8e6da2c4c8850a4e4f6cd325a51dbcbe
SHA25625aa861bda9242cb199afcf65c71ae86c17894548419d6ea20d85c9a8cc00e71
SHA51254a37bfeaebd229dfedfc78daa0c84795c9cab028f1e668f0b5f721eb8fca9b0d8f4bf311dd8428a0cb718ab684bf4f744b092d06d8790cdd849ec431ce14eec