• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Malware • Ransomware • Security  /  Ghost Has Arrived
Ghost Has Arrived
14 December 2018

Ghost Has Arrived

Written by Ghanshyam More
Ghanshyam More
Cybersecurity, Malware, Ransomware, Security
26
Shares

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files.

Technical Analysis :

Main malware executable (Ghost.exe) is compiled using the DotNet Framework. The infection vector of this ransomware is still unknown, but this file may arrive on the victim’s machine via spam emails, malvertising, bundled with other files, etc. It uses an icon of the spreadsheet to deceive the user to think he has received an invoice/quotation etc.

Initially, Ghost.exe queries “www.12312312eewfef231.com”. This domain is not registered, but if it is registered then it can work as a kill switch as it performs its malicious activity in the catch for the exception as shown in Fig. 1.

Fig. 1: DNS Query

Ghost.exe drops an executable GhostService.exe at location “%appdata%\Ghost” on the victim’s machine. It also creates a bat file (Ghost.bat) in Ghost folder and executes it. Ghost.bat creates a service with display name as“Ghost”, binpath as“%appdata%\Ghost\GhostService.exe” and start mode as “auto” as shown in Fig. 2. Due to auto mode, malware service will be auto-started on every system startup.

Fig. 2: Code to create “Ghost.bat”
Fig. 3: Content of Ghost.bat to register service

Once the service is successfully registered Ghost.exe starts “Ghost” service as shown in Fig. 4.

Fig. 4: Function to start Ghost Service

GhostService.exe creates a .txt file named “Do_Not_Delete_codeId.txt” at the root of“C” drive with Code ID as a content. This Code ID is randomly generated as shown in Fig. 5.

Fig. 5: Function to generate random Code ID

Now it calls a function “startProcess” to drop components at the root of “C” drive.

As shown in Fig. 6, GhostService.exe drops below components:

  • GhostForm.exe – Displays Ransom note and encrypt files
  • GhostFile.dll – Exports functions to create a list of files
  • GhostHammer.dll – Exports AES_Encrypt function

    Fig. 6: Function to drop components and start GhostForm.exe

After dropping the components, it runs GhostForm.exe. Then it calls a function “Database” to stop MSSQLSERVER service and encrypt files in “Microsoft SQL Server” folder.

Fig. 7: Function to encrypt Database files
Fig. 8: Function to stop SQL service

It has a list of file extensions which are to be encrypted as shown in Fig. 9.

Fig. 9: List of file extensions to be encrypted by GhostService.exe

Also, it calls a function “datosC” that encrypts files present only at the root of “C” drive.

Fig. 10: Function to encrypt files at the root of “C” drive

GhostService.exe maintains a timer which repeats these tasks after every 120 seconds.

Fig. 11: Timer function

GhostForm.exe displays a Ransom note. It also maintains a timer, after every 120 seconds it closes the Ransom note.

Fig. 12: Ransom Note

Code ID in ransom note is same as one written to C:\Do_Not_Delete_codeId.txt.

As seen in Fig. 12 malware author demands Bitcoin worth 500 USD to be paid to the following address : https://blockchain.info/payment_request?address=1N7AmqH12EN3yAkVMPB5rZoVX758jgLbzj&amount_local=500&currency=USD&nosavecurrency=true&message=Pay%20me!

Fig. 13: Contents of Do_Not_Delete_codeId.txt

Next, it calls a function “startEncrypt” to create a list of files present in the following folders :

  • Desktop
  • Document
  • Picture
  • Videos
  • Music

As seen in the above list, malware encrypts the files at some specific locations only. It has targeted Desktop folder where the user usually keeps most of their data. Also, Document, Pictures, Videos, and Music are folders provided by Windows OS to store respective type of files.

Fig. 14: Function to create a list of files and encrypt them

Functions to get the list of files from above-mentioned folders are present in GhostFile.dll.

Fig. 15: Function to create a list of files in the Desktop folder
Fig. 16: Function to create a list of files in the Documents folder
Fig. 17: Function to create a list of files in the Pictures folder
Fig. 18: Function to create a list of files in the Videos folder
Fig. 19: Function to create a list of files in the Music folder

The malware creates a list of files based on extensions present in the extension list as shown in Fig. 20. Once the list of files is ready, encryption routine is called from GhostHammer.dll. Files are encrypted using AES algorithm and “.Ghost”extension is added to encrypted files.

Fig. 20: List of file extensions to be encrypted by GhostForm.exe

Difference between the 2 extension list is “.txt” files are not encrypted by GhostService whereas they are encrypted by GhostForm.exe.

IOCs :

3a2633cd5152a229d1f986073082ecd0

3d33f7f9f2e5fa3f4e7d2d6de5c9b7f1

464da6c4465816cba2d278634e2b9d3e

5db40b7c42376cc077383069a9c509eb

b93588bbb3f3f0addd5598586bbe2566

cd0f7f29e337f2ebe455ba4a85fb2b70

Quick Heal products detects these malware with below names :

“Ransom.Ghost.S*”

“Ransom.Bat.Ghost.*”

Conclusion :

We have seen the ransomware count to have significantly increased in recent times. Malware authors have started using different techniques to encrypt user files.

Some general recommendations to stay safe from Ransomware :

  • Do not open suspicious emails, especially if they have an attachment.
  • Update your Operating System(OS)
  • Update your software. Older and outdated versions of software have vulnerabilities which are mostly exploited by attackers to infect your system.
  • Take regular data backup and keep it in a secure location.
  • Use a multi-layered antivirus in your system which will protect you from real-time threats. And keep your antivirus up-to-date.

Subject Matter Expert:

Ravi Gidwani | Quick Heal Security Labs

 Previous PostSophisticated Ransomware : “Katyusha”
Next Post  GandCrab says, “We will become back very soon! ;)”
Ghanshyam More

About Ghanshyam More

Ghanshyam is a security researcher at Quick Heal Security Labs. He is interested in reverse engineering and analyzing security vulnerabilities and...

Articles by Ghanshyam More »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies