Overview
overview
7Static
static
3GooberWasH...er.exe
windows11-21h2-x64
4GWHLauncher.bat
windows11-21h2-x64
7PLAYERDATA...r.json
windows11-21h2-x64
3assets/NOTE.png
windows11-21h2-x64
3assets/PAY...OM.exe
windows11-21h2-x64
7PAYLOAD1_COM.pyc
windows11-21h2-x64
3assets/PAY...OM.exe
windows11-21h2-x64
7payload.pyc
windows11-21h2-x64
3config/cfg.ini
windows11-21h2-x64
3mods/INSTALL_MODS.md
windows11-21h2-x64
3Analysis
-
max time kernel
441s -
max time network
443s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/11/2024, 21:15
Behavioral task
behavioral1
Sample
GooberWasHereInstaller.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
GWHLauncher.bat
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
PLAYERDATA/player.json
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
assets/NOTE.png
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
assets/PAYLOAD1_COM.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
PAYLOAD1_COM.pyc
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
assets/PAYLOAD2_COM.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
payload.pyc
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
config/cfg.ini
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
mods/INSTALL_MODS.md
Resource
win11-20241007-en
General
-
Target
assets/PAYLOAD2_COM.exe
-
Size
6.7MB
-
MD5
80d71d90b6c92ce2aa1dd1e7c7a8b958
-
SHA1
bf6abdab3a408c92c5e64db939186598603c664f
-
SHA256
4e4de78ad398dfbd0b396d06dfe00b9ce885bd85ee6c56f255f691c0c8702268
-
SHA512
7e0adf162cb6e1943b942a9d48d2b3c25fc19d7c18dc1d8ec76a1cff10d4486080281ea2371ebd0d0ccda1882a68ae493e3edfa9838413605031d788224b0761
-
SSDEEP
98304:6VpM8xAG9XWA1h9eT393YigJhH0y3T+q2M51Y7uRlXgVLRuq97Tg3KhudVj2Cf:wMQN9GA1HeT39Iig7auDXURuATHEr
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2044 PAYLOAD2_COM.exe 2044 PAYLOAD2_COM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 404 wrote to memory of 2044 404 PAYLOAD2_COM.exe 78 PID 404 wrote to memory of 2044 404 PAYLOAD2_COM.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\assets\PAYLOAD2_COM.exe"C:\Users\Admin\AppData\Local\Temp\assets\PAYLOAD2_COM.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\assets\PAYLOAD2_COM.exe"C:\Users\Admin\AppData\Local\Temp\assets\PAYLOAD2_COM.exe"2⤵
- Loads dropped DLL
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD5aa1083bde6d21cabfc630a18f51b1926
SHA1e40e61dba19301817a48fd66ceeaade79a934389
SHA25600b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3
SHA5122df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c
-
Filesize
249KB
MD5c88282908ba54510eda3887c488198eb
SHA194ed1b44f99642b689f5f3824d2e490252936899
SHA256980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278
SHA512312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd
-
Filesize
63KB
MD5b4ff25b1aca23d48897fc616e102e9b6
SHA18295ee478191eb5f741a5f6a3f4ab4576ceec8d2
SHA25687dd0c858620287454fd6d31d52b6a48eddbb2a08e09e8b2d9fdb0b92200d766
SHA512a7adcf652bc88f8878dae2742a37af75599936d80223e62fe74755d6bafaafd985678595872fb696c715f69a1f963f12e3d52cd3d7e7a83747983b2ee244e8a2
-
Filesize
155KB
MD5b86b9f292af12006187ebe6c606a377d
SHA1604224e12514c21ab6db4c285365b0996c7f2139
SHA256f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5
SHA512d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312
-
Filesize
77KB
MD5b77017baa2004833ef3847a3a3141280
SHA139666f74bd076015b376fc81250dff89dff4b0a6
SHA256a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166
SHA5126b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d
-
Filesize
1.4MB
MD533b78352c2290204f06852e93ddee4d0
SHA1eba60a3bc8f605931a08303b5068cb461ce82136
SHA25638b62b5427dadb1216c5f6a2fd080f3bbb5d1c311ca1d5904c2d216d0bf26945
SHA512f96b455bf53bb6ba58feef4e089ffb524575da084b34c4f7a24adb48679749f9007033fe1f197227a3b705f5f381fbe200b8c2d46e72a2709c320a7f3a60c09f
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
29KB
MD5e4ab524f78a4cf31099b43b35d2faec3
SHA1a9702669ef49b3a043ca5550383826d075167291
SHA256bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90
SHA5125fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee
-
Filesize
1.1MB
MD5fd9132f966ee6d214e0076bf0492fb30
SHA189b95957f002bf382435d015e26962a42032cb97
SHA25637c68617fa02a2cadced17ef724e2d450ef12a8a37215da789a4679fde1c5c02
SHA512e35729abc45e5561aae1fb9e0e7c711dd7d3c1491520aa5c44fcc50c955f549f81d90897959327e930d02a5356afe08d6195adf002c87801a7a11235670639b5