| File name: | CyberGhost 6 Pre-Activated.exe |
| Full analysis: | https://app.any.run/tasks/c5ddf65b-019f-4b7b-b2b0-6373c44c4b7a |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | August 13, 2024, 14:59:57 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 57ED0E9CA4F2441B6005E71A2470F178 |
| SHA1: | 50DE290AB5939EE9ADBC7114E4AFFBF4CF616EA5 |
| SHA256: | D5603E7CB8C4072F5E53A8B4A32A490D5BAA55F191EF01760A7368DEC0120E47 |
| SSDEEP: | 98304:Ni8R0liAsICwXIsKQbFbVCW93vlhbY2mdS/sg5kuSsJHuKj5Kn+8xzBi52S7dQ3v:UivSdoUn4b2eTIW59+/SRDSXis9elTd |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2015:12:27 05:38:55+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24576 |
| InitializedDataSize: | 164864 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x310d |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 236 | DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\WINDOWS\INF\oem1.inf" "oem1.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "00000000000001F8" | C:\Windows\System32\drvinst.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 420 | taskkill.exe /f /t /im wyUpdate.exe | C:\Windows\SysWOW64\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1108 | "C:\Program Files (x86)\CyberGhost\wyUpdate.exe" /justcheck /quickcheck /noerr -server="https://download.cyberghostvpn.com/windows/updates/6/wyserver.wys" | C:\Program Files (x86)\CyberGhost\wyUpdate.exe | CyberGhost.Service.exe | ||||||||||||
User: SYSTEM Company: wyDay Integrity Level: SYSTEM Description: wyUpdate Exit code: 1 Version: 2.6.18.4 Modules
| |||||||||||||||
| 1564 | "C:\Program Files\TAP-Windows\bin\tapinstall.exe" install "C:\Program Files\TAP-Windows\driver\OemVista.inf" tap0901 | C:\Program Files\TAP-Windows\bin\tapinstall.exe | tap-windows-9.21.2.exe | ||||||||||||
User: admin Company: Windows (R) Win 7 DDK provider Integrity Level: HIGH Description: Windows Setup API Exit code: 0 Version: 6.1.7600.16385 built by: WinDDK Modules
| |||||||||||||||
| 1568 | C:\WINDOWS\system32\net1 start CG6Service | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1812 | DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{6163ea89-a85b-e645-8ae5-447c88e4e92f}\oemvista.inf" "9" "4d14a44ff" "00000000000001CC" "WinSta0\Default" "00000000000001D0" "208" "c:\program files\tap-windows\driver" | C:\Windows\System32\drvinst.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Driver Installation Module Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2204 | "C:\Program Files (x86)\CyberGhost\CyberGhost.exe" /install | C:\Program Files (x86)\CyberGhost\CyberGhost.exe | c.tmp | ||||||||||||
User: admin Company: CyberGhost S.R.L. Integrity Level: HIGH Description: CyberGhost Exit code: 1 Version: 6.0.2.1985 Modules
| |||||||||||||||
| 2204 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3480 --field-trial-handle=2432,i,940381197588506387,5779426533443902729,262144 --variations-seed-version /prefetch:1 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| 2228 | "C:\Program Files (x86)\CyberGhost\CyberGhost.Service.exe" | C:\Program Files (x86)\CyberGhost\CyberGhost.Service.exe | services.exe | ||||||||||||
User: SYSTEM Company: CyberGhost S.R.L Integrity Level: SYSTEM Description: CyberGhost Service Exit code: 0 Version: 6.0.0.0 Modules
| |||||||||||||||
| 2228 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5136 --field-trial-handle=2432,i,940381197588506387,5779426533443902729,262144 --variations-seed-version /prefetch:8 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 122.0.2365.59 Modules
| |||||||||||||||
| (PID) Process: | (6468) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6468) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6468) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6468) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (6512) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6512) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6512) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6512) CyberGhost 6 Pre-Activated.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (6524) CyberGhost.Services.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (6524) CyberGhost.Services.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\Local\Temp\ppwzpni | text | |
MD5:02CCA0BAD46DC052F826FD0A421A9578 | SHA256:7A00391F03B220C280A666CB9C14CC0AEAF2BB13714023A19F7AC58DDC715346 | |||
| 6512 | CyberGhost 6 Pre-Activated.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\a.bat | text | |
MD5:0A8DFA01820BE7FAC292D6309F077FB8 | SHA256:4274640EF8F089651E9B3D944CC730D12F55205C8DFD1F16C94590592FA0C000 | |||
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\checkip[1].htm | html | |
MD5:0ABFFF5C8908F6469A29072D504D1E28 | SHA256:C6E676F721EAD81D2AA39F3AD6BDC8E9C4C78CDDAB51912CF4348FAB9E87D586 | |||
| 6468 | CyberGhost 6 Pre-Activated.exe | C:\Users\admin\AppData\Local\Temp\CyberGhost 6 Pre-Activated.exe | executable | |
MD5:90EA6990F94DD4ACA299B7E46433778E | SHA256:460D85F45A888AC07CF3EDBDA90B8D06129FD3D3E308CF9F07C813EA4DD22FA3 | |||
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KNMFMV.lnk | lnk | |
MD5:584BD6B04482BB633F2FCFDE9123AA68 | SHA256:F79178C1E3B06D7B9EFD67767C10DF3FE48AB73C56C741FCD8FCD78A8658250E | |||
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\89812DAB4DE1216F65B6E38CBC09A61A | der | |
MD5:920548DFB46915598D61C8B3424F3916 | SHA256:D18C105AF5B9E99E480A045BDD93A69221CB8D8EE8DCD1318463C1FA63156547 | |||
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:3DFCA46E00FFA4795C72A41375F159D3 | SHA256:DCBA1A505396539BAC40A7253C9F5DCCF06CBB79957E21D56305E1FC3AF5F40E | |||
| 6624 | c.tmp | C:\Users\admin\AppData\Local\Temp\is-9G0M6.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 6524 | CyberGhost.Services.exe | C:\Users\admin\AppData\Local\Temp\aut681C.tmp | binary | |
MD5:CE09C5E97C0BBA8791B0CFE63ED7C2A2 | SHA256:8BF49037BA5AAFFDEA50DDA6786EA4DAD13CE200A0BC18AE95892C057E487A52 | |||
| 6624 | c.tmp | C:\Program Files (x86)\CyberGhost\unins000.exe | executable | |
MD5:6FAD6EB0633683E86608DBA6B78D8FC7 | SHA256:5FE40B75370526D961707974B6EA046F09326B21D3D85951A18EC9E1193A5489 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6524 | CyberGhost.Services.exe | GET | 301 | 188.138.68.212:80 | http://ip-score.com/checkip/ | unknown | — | — | shared |
6524 | CyberGhost.Services.exe | GET | 200 | 184.25.51.82:80 | http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgQsSDEzk7zHHI1PKqCRa9Y0Xg%3D%3D | unknown | — | — | whitelisted |
6524 | CyberGhost.Services.exe | GET | 301 | 188.138.68.212:80 | http://ip-score.com/checkip/ | unknown | — | — | shared |
644 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2968 | svchost.exe | GET | 304 | 2.23.197.184:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
6904 | CyberGhost.Service.exe | GET | 200 | 172.64.149.23:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI%3D | unknown | — | — | whitelisted |
6904 | CyberGhost.Service.exe | GET | 200 | 172.64.149.23:80 | http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI%3D | unknown | — | — | whitelisted |
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6828 | msedge.exe | GET | 200 | 103.224.182.206:80 | http://ouncht.com/jscheck.php?enc=GRYkutoCTrIGLH%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&rand=0.33509191672607774&vs=1272:606&ds=1280:720&sl=0:0&os=f&nos=f&if=f&sc=f&gpu=Google%20Inc.%20(Google)%20-%20ANGLE%20(Google,%20Vulkan%201.3.0%20(SwiftShader%20Device%20(Subzero)%20(0x0000C0DE)),%20SwiftShader%20driver)&fp=830d32d1e0315de41ae158f693ec9572 | unknown | — | — | unknown |
6904 | CyberGhost.Service.exe | GET | 200 | 172.64.149.23:80 | http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCEC58h8wOk0pS%2FpT9HLfNNK8%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4064 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4576 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
6524 | CyberGhost.Services.exe | 188.138.68.212:80 | ip-score.com | Host Europe GmbH | FR | unknown |
6524 | CyberGhost.Services.exe | 188.138.68.212:443 | ip-score.com | Host Europe GmbH | FR | unknown |
6524 | CyberGhost.Services.exe | 184.25.51.82:80 | r11.o.lencr.org | Akamai International B.V. | DE | unknown |
4576 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5336 | SearchApp.exe | 2.23.209.154:443 | www.bing.com | Akamai International B.V. | GB | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
ip-score.com |
| shared |
r11.o.lencr.org |
| whitelisted |
googleindia.ddns.net |
| malicious |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6524 | CyberGhost.Services.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
6524 | CyberGhost.Services.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-score.com |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
6524 | CyberGhost.Services.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
6524 | CyberGhost.Services.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-score.com |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
2256 | svchost.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.ddns .net |
Process | Message |
|---|---|
Setup.exe | The operation completed successfully.
|
CyberGhost.Service.exe | Checking for Update on https://download.cyberghostvpn.com/windows/updates/6/
|
CyberGhost.Service.exe | !!! UNLOCKING ALL INTERNET-CONNECTIONS !!!
|
CyberGhost.Service.exe | Checking for Update on https://download.cyberghostvpn.com/windows/updates/6/
|
msedge.exe | [0813/150158.210:WARNING:device_ticket.cc(151)] Timed out waiting for device ticket. Canceling async operation.
|
msedge.exe | [0813/150158.851:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ff6278d0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0813/150158.851:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
msedge.exe | [0813/150158.851:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff85f0000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|
msedge.exe | [0813/150158.851:WARNING:pe_image_reader.cc(340)] could not read dos header from C:\WINDOWS\SYSTEM32\ntdll.dll
|
msedge.exe | [0813/150158.851:ERROR:process_memory_win.cc(74)] ReadMemory at 0x7ffff6f10000 of 64 bytes failed: Only part of a ReadProcessMemory or WriteProcessMemory request was completed. (0x12B)
|