Overview
overview
10Static
static
3Ghosty Per...er.rar
windows7-x64
10Ghosty Per...er.rar
windows10-2004-x64
1Ghosty Per...FN.exe
windows7-x64
10Ghosty Per...FN.exe
windows10-2004-x64
10Ghosty Per....1.exe
windows7-x64
1Ghosty Per....1.exe
windows10-2004-x64
1Ghosty Per....1.exe
windows7-x64
1Ghosty Per....1.exe
windows10-2004-x64
1Ghosty Per...ry.dll
windows7-x64
5Ghosty Per...ry.dll
windows10-2004-x64
5Ghosty Per...64.dll
windows7-x64
1Ghosty Per...64.dll
windows10-2004-x64
1Ghosty Per...on.dll
windows7-x64
1Ghosty Per...on.dll
windows10-2004-x64
1Ghosty Per...ec.dll
windows7-x64
1Ghosty Per...ec.dll
windows10-2004-x64
1Ghosty Per...z2.dll
windows7-x64
1Ghosty Per...z2.dll
windows10-2004-x64
1Ghosty Per...pe.dll
windows7-x64
1Ghosty Per...pe.dll
windows10-2004-x64
1Ghosty Per...ui.ini
windows7-x64
3Ghosty Per...ui.ini
windows10-2004-x64
1Ghosty Per...16.dll
windows7-x64
1Ghosty Per...16.dll
windows10-2004-x64
1Ghosty Per...rts.sh
windows7-x64
3Ghosty Per...rts.sh
windows10-2004-x64
3Ghosty Per...th.sln
windows7-x64
3Ghosty Per...th.sln
windows10-2004-x64
3Ghosty Per...th.xml
windows7-x64
3Ghosty Per...th.xml
windows10-2004-x64
1Ghosty Per...ilters
windows7-x64
3Ghosty Per...ilters
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 22:30
Static task
static1
Behavioral task
behavioral1
Sample
Ghosty Permanent Spoofer.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ghosty Permanent Spoofer.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ghosty Permanent Spoofer/GHOSTYFN.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Ghosty Permanent Spoofer/GHOSTYFN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Ghosty Permanent Spoofer/KA-LicenseKey_x86_x64_v1.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Ghosty Permanent Spoofer/KA-LicenseKey_x86_x64_v1.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Ghosty Permanent Spoofer/KA-MemIntegrity_x86_x64_v1.1.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Ghosty Permanent Spoofer/KA-MemIntegrity_x86_x64_v1.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Ghosty Permanent Spoofer/SafeGuard-Library.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Ghosty Permanent Spoofer/SafeGuard-Library.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Ghosty Permanent Spoofer/VMProtectSDK64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ghosty Permanent Spoofer/VMProtectSDK64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ghosty Permanent Spoofer/brotlicommon.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Ghosty Permanent Spoofer/brotlicommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Ghosty Permanent Spoofer/brotlidec.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ghosty Permanent Spoofer/brotlidec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Ghosty Permanent Spoofer/bz2.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Ghosty Permanent Spoofer/bz2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Ghosty Permanent Spoofer/freetype.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
Ghosty Permanent Spoofer/freetype.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Ghosty Permanent Spoofer/imgui.ini
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Ghosty Permanent Spoofer/imgui.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Ghosty Permanent Spoofer/libpng16.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Ghosty Permanent Spoofer/libpng16.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Ghosty Permanent Spoofer/server/Certificates/generate-certs.sh
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Ghosty Permanent Spoofer/server/Certificates/generate-certs.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Ghosty Permanent Spoofer/server/EmuAuth.sln
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Ghosty Permanent Spoofer/server/EmuAuth.sln
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.xml
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.vcxproj.filters
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.vcxproj.filters
Resource
win10v2004-20241007-en
General
-
Target
Ghosty Permanent Spoofer/server/EmuAuth/EmuAuth.vcxproj.filters
-
Size
1KB
-
MD5
275f48c170e75221487400c04dab0bd7
-
SHA1
a8a2b2cec7e36b3935335a638821e228cf00f4fe
-
SHA256
8dbc9ee75e135a99602172c9043775b31153fd52d061205bc7f0e72a24349374
-
SHA512
6dce8a9a6d3ef6235c2e74d122d0debd15e6e0ccb7fc1c3a2752616fbb51acaf9635163c00373bc9ec6b4c380db5dc268b69692901f5c9609aa98a4d31921075
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4028 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Ghosty Permanent Spoofer\server\EmuAuth\EmuAuth.vcxproj.filters"1⤵
- Modifies registry class
PID:1632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4028