Overview
overview
3Static
static
3Spoofing method.zip
windows7-x64
1Spoofing method.zip
windows10-2004-x64
1Eac.gg-Spo...in.zip
windows7-x64
1Eac.gg-Spo...in.zip
windows10-2004-x64
1Eac.gg-Spo...AC.sys
windows10-2004-x64
1Eac.gg-Spo...nd.exe
windows7-x64
1Eac.gg-Spo...nd.exe
windows10-2004-x64
1Eac.gg-Spo...er.exe
windows7-x64
1Eac.gg-Spo...er.exe
windows10-2004-x64
1Eac.gg-Spo...ew.sys
windows7-x64
1Eac.gg-Spo...ew.sys
windows10-2004-x64
1Eac.gg-Spo...w1.sys
windows10-2004-x64
1Eac.gg-Spo...gk.sys
windows10-2004-x64
1GRINX64v2.zip
windows7-x64
1GRINX64v2.zip
windows10-2004-x64
1GRINX64v2/...IN.exe
windows7-x64
1GRINX64v2/...IN.exe
windows10-2004-x64
1GRINX64v2/...64.exe
windows7-x64
1GRINX64v2/...64.exe
windows10-2004-x64
1GRINX64v2/DMI16.exe
windows7-x64
GRINX64v2/DMI16.exe
windows10-2004-x64
GRINX64v2/DMIEDIT.exe
windows7-x64
1GRINX64v2/DMIEDIT.exe
windows10-2004-x64
1GRINX64v2/README.txt
windows7-x64
1GRINX64v2/README.txt
windows10-2004-x64
1GRINX64v2/...LL.dll
windows7-x64
3GRINX64v2/...LL.dll
windows10-2004-x64
3GRINX64v2/...YS.sys
windows7-x64
1GRINX64v2/...YS.sys
windows10-2004-x64
1GRINX64v2/...XD.vxd
windows7-x64
1GRINX64v2/...XD.vxd
windows10-2004-x64
1GRINX64v2/...64.sys
windows7-x64
1Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
Spoofing method.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Spoofing method.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Eac.gg-Spoofer-Crack-main.zip
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Eac.gg-Spoofer-Crack-main.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Eac.gg-Spoofer-Crack-main/EAC.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
Eac.gg-Spoofer-Crack-main/command.exe
Resource
win7-20240611-en
Behavioral task
behavioral7
Sample
Eac.gg-Spoofer-Crack-main/command.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Eac.gg-Spoofer-Crack-main/mapper.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
Eac.gg-Spoofer-Crack-main/mapper.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
Eac.gg-Spoofer-Crack-main/new.sys
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
Eac.gg-Spoofer-Crack-main/new.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
Eac.gg-Spoofer-Crack-main/new1.sys
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
Eac.gg-Spoofer-Crack-main/vgk.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
GRINX64v2.zip
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
GRINX64v2.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
GRINX64v2/AMIDEWIN.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
GRINX64v2/AMIDEWIN.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral18
Sample
GRINX64v2/AMIDEWINx64.exe
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
GRINX64v2/AMIDEWINx64.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral20
Sample
GRINX64v2/DMI16.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
GRINX64v2/DMI16.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
GRINX64v2/DMIEDIT.exe
Resource
win7-20240611-en
Behavioral task
behavioral23
Sample
GRINX64v2/DMIEDIT.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral24
Sample
GRINX64v2/README.txt
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
GRINX64v2/README.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
GRINX64v2/UCOREDLL.dll
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
GRINX64v2/UCOREDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
GRINX64v2/UCORESYS.sys
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
GRINX64v2/UCORESYS.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
GRINX64v2/UCOREVXD.vxd
Resource
win7-20240220-en
Behavioral task
behavioral31
Sample
GRINX64v2/UCOREVXD.vxd
Resource
win10v2004-20240611-en
Behavioral task
behavioral32
Sample
GRINX64v2/UCOREW64.sys
Resource
win7-20240221-en
General
-
Target
GRINX64v2/UCOREDLL.dll
-
Size
112KB
-
MD5
8370f3114924ed6c53741de7a253625a
-
SHA1
f7782d51e73526226a89229b4f3625c7ce43f3b3
-
SHA256
78a4d8e5e8c33793e5a2020325d3a49e92e4826167742e93179bdacbf167b409
-
SHA512
5a13c0fb787366869fac57139fa2ebbd0c34a1bfa76c05ac879da60e534cbac694385f2b6120fdb6c7cf0e62cf4948efbdfde96e695a9d377f44eedb2e1b1398
-
SSDEEP
1536:g+FKwswB29BLymvRwRvSpD0pQD61ShZT1Cw4cf0SbtsWFoYc0RkU:g8Vk9ymvyNMO4QqGeyqoLGL
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 400 216 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3920 wrote to memory of 216 3920 rundll32.exe rundll32.exe PID 3920 wrote to memory of 216 3920 rundll32.exe rundll32.exe PID 3920 wrote to memory of 216 3920 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GRINX64v2\UCOREDLL.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GRINX64v2\UCOREDLL.dll,#12⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 6163⤵
- Program crash
PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 216 -ip 2161⤵PID:1724