Overview
overview
7Static
static
3GRScript-v...fig.js
windows7-x64
3GRScript-v...fig.js
windows10-2004-x64
3GRScript-v...pt.chm
windows7-x64
1GRScript-v...pt.chm
windows10-2004-x64
1GRScript-v...er.exe
windows7-x64
3GRScript-v...er.exe
windows10-2004-x64
3GRScript-v...ot.exe
windows7-x64
3GRScript-v...ot.exe
windows10-2004-x64
3GRScript-v...ck.exe
windows7-x64
1GRScript-v...ck.exe
windows10-2004-x64
3GRScript-v...xe.exe
windows7-x64
7GRScript-v...xe.exe
windows10-2004-x64
7GRScript-v...32.dll
windows7-x64
3GRScript-v...32.dll
windows10-2004-x64
3GRScript-v...QL.dll
windows7-x64
3GRScript-v...QL.dll
windows10-2004-x64
3GRScript-v...32.dll
windows7-x64
3GRScript-v...32.dll
windows10-2004-x64
3GRScript-v...��.url
windows7-x64
1GRScript-v...��.url
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
GRScript-v1.5/Config.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
GRScript-v1.5/Config.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
GRScript-v1.5/GRScript.chm
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
GRScript-v1.5/GRScript.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
GRScript-v1.5/GRZiper.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
GRScript-v1.5/GRZiper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
GRScript-v1.5/GrayRobot.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
GRScript-v1.5/GrayRobot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
GRScript-v1.5/Template/GRSPack.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
GRScript-v1.5/Template/GRSPack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
GRScript-v1.5/Template/MainExe.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
GRScript-v1.5/Template/MainExe.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
GRScript-v1.5/libeay32.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
GRScript-v1.5/libeay32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
GRScript-v1.5/libmySQL.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
GRScript-v1.5/libmySQL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
GRScript-v1.5/ssleay32.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
GRScript-v1.5/ssleay32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
GRScript-v1.5/新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
GRScript-v1.5/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
GRScript-v1.5/libeay32.dll
-
Size
1008KB
-
MD5
c5b2b660964a5e6a1efbf02db007a752
-
SHA1
460a4e2d8e2369d4b01d07f2ab7ec16ef6c70e21
-
SHA256
4fe9b26fecf84085fea5ed54db5ca0781458de09851076bb3a138760df2cf480
-
SHA512
aa7288c47ced3cb5337e80da5350346822aac1cef05c41106ebfcb63599689a7a110fcc5f8f704a84fcec6fe1900a4c1d993c28428f1f99eb0805080e5b28091
-
SSDEEP
24576:oPW5+iRFufTaKJ2WQwpjXLlKhS6T5vrH:Z8fTVJppwhS6T5vrH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31 PID 1652 wrote to memory of 2268 1652 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GRScript-v1.5\libeay32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GRScript-v1.5\libeay32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2268
-