Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 22:30

General

  • Target

    Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.xml

  • Size

    7KB

  • MD5

    72dd431cf325ada32e9560ddb65a659e

  • SHA1

    12e726f8f3c9721fcc18946c0908b17bf1f18997

  • SHA256

    503307a798fd4b15280f619f66117b7d99887f9c159b1d90e540bdce6c5fe3d9

  • SHA512

    83e35b1fec8ef8445f4c652becf207b3cff445b87c5b32761442a3d176c5e9de7e618626ef77e9b34cbf4b5cd8dfd1e23bff6e8cdbe43aaec7e9e90f7a6cfd5d

  • SSDEEP

    96:Z0/zcpU1fNOw7FO7bw7aOL2YyaLbyaLMyaL6yaLDmzA7/ePPcrAf/eWPcKfA7/ep:e/zcmls4hN/YPce/JPct/gPcL/xPcn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Ghosty Permanent Spoofer\server\EmuAuth\EmuAuth.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    957316860790de4a9621e93138132bbb

    SHA1

    e6825c28bef981f5b06d1d7495a699f3fea4e56a

    SHA256

    e4b1f023c73832fd5b913c67dfec025d8be23538f3e8d5d22f347275ee2c6b46

    SHA512

    6165ff9cac15cdded277c8cd22f93ab1acd4da61800dd51482b4a450c48900415634ebbb2076d5111fce7bf097ba9054964ed3f66cebe626f0254e0f460f91c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d04254ca064e4b9f90f3dac21ba175e

    SHA1

    e22bfec4b8c86afea49cc4c78fd71a5c4ec392c3

    SHA256

    6f05c61fd7b15112c4fafbae0d2501dd54c863820009f32b9a63f87b5fb76b44

    SHA512

    ebbba23717c27412602b1d5362047a45995542ec4e8113d1409a54130e1689f1f610752630cdde372ca72eaa5d0a1e3f9b6db5e057c18f786a6ccd2342af082c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    904eeb1607bc9bd131b9bef610dfbe17

    SHA1

    926df2416cba3132ba90da75124b7591f6be6337

    SHA256

    ce37fbedf8c9abe9c2795e04e32b303a92faf59d90cf61fdb61b3ba094ca2b2b

    SHA512

    0376b4803ae419c746681009a41c84492373624f995219b902f8882cd8222037a72b9ee69fa56556820a37b910248d2a675bbd8c0294756cea941f121930061d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d6700bb9921bd7b849f7d362a86519d

    SHA1

    2ec141f354ad2c5a5ffa76bbe6286e854c895eab

    SHA256

    8c073160197a158abcc70776ac50646384a1b26a9578dc0af7a51ff9a8e75aa1

    SHA512

    8a08147622a9f179b7718044984677c59185c0db3cd4671c864afdbdcc16612b52749d9f3eb656ef1a1683ba92721f7113e9100c0a9e4814695bcf3e451219cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea668582720a0dd315f3c6e368227265

    SHA1

    c89569a91eee0a061de8d5cfbe07e88c77966710

    SHA256

    ede052b4c240b4720d15fd040cd57fec5b828e2f04e26de9505be408eff15f60

    SHA512

    77c04dace98d3395c502956dd407372ba7780e228189f305ab0fc2182bea7a22f3399f6015705582cdc9550e0dcc695ceb652dba186a7346c4b62e83dbb0d6b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60dc9d4950f9c5bd38f3b56a22904b17

    SHA1

    4e27a132223450141c6c0a90c05439c0e59127e4

    SHA256

    9fd6de23e04a2254553ac2e0db227bc7d62c6454183c2b40c7eff791a8eda419

    SHA512

    be82a5d49a7387a7fb5d4ceba0f74ae9b7a5e2e7c7fe2937b875dc3461db91e3d13f706719bc0e359938ad5bddfd1ecc4be529ba89938290880908ed674e8d86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d663087c06ce1ff31ebbb150bb403351

    SHA1

    48e65801f1280cf9c51f4a8795b9cd71af135d83

    SHA256

    539f0a07521b938253767672619305edbae9ddf6a494e5e9cd30fea67c17a496

    SHA512

    1200ce45a29716b57276f0bf2361c46336561a96babd52c95ff0b220bdac1294a7997e363b0be7082ddf4785fa790d969108099dcdcf77a399b3194510dac6d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3861a721d0433cad06a3013314a17959

    SHA1

    6fb22196c04e9acc5adaa42b674909e8ba7d412c

    SHA256

    05cb12a5436181d1bab4548e0830f8152af3a1e502c64d34817ae69157cc9c78

    SHA512

    66f6e5c5b9412996f5671271147f5bde2f3328ed412dda35226bae3de1f94fee4cd6687c3adfec904590ad7b939d23727ff83286c2dd1c2acc0fa0a524c3a1d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86c01f0380682f1fa879dc491eefadc8

    SHA1

    b0815ac15aca45e21ad1f32c4ce8f2e1dc67c4ae

    SHA256

    7dab62af28993ad824c424b7dec69a9b7aa37daf858218766ff7fe6ec4741dfa

    SHA512

    f6989b016802f8e7516169f325c3f95f69d7722ac47287cfe7ada860b13ec0b5e734dfe90604de215c105d86217692fbb4210ff62ce989af084a38156889fe90

  • C:\Users\Admin\AppData\Local\Temp\Cab64FB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar656D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b