Overview
overview
10Static
static
10Greber/Create app.exe
windows7-x64
7Greber/Create app.exe
windows10-2004-x64
8Greber/GH ...64.dll
windows7-x64
1Greber/GH ...64.dll
windows10-2004-x64
1Greber/GH ...86.dll
windows7-x64
3Greber/GH ...86.dll
windows10-2004-x64
3Greber/GH ...64.exe
windows7-x64
1Greber/GH ...64.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 23:45
Behavioral task
behavioral1
Sample
Greber/Create app.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Greber/Create app.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Greber/GH Injector - x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Greber/GH Injector - x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Greber/GH Injector - x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Greber/GH Injector - x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win10v2004-20241007-en
General
-
Target
Greber/Create app.exe
-
Size
6.9MB
-
MD5
daf401bcb8798795f4ef6b97845cdc97
-
SHA1
469cc0adc7b457fff82ff9db7dd00d8dd142e62d
-
SHA256
87ff9011222048726911a86de021f2787d3fbba758ad3c97b9ab72461b4574af
-
SHA512
f35f9de788ce9fdc9ee5d88fd1e186c83f5b91f2ed5da55202d08bd3e8fae3396409081639f4b728a8413853d88e4824af533a2cede79edd47f703184cd6f1d7
-
SSDEEP
98304:+a+vITBg6gHamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkzmas5J1n6ksB0rNHMo:+VIsqeNlpYfMQc2sEhn6ksqV
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2020 Create app.exe -
resource yara_rule behavioral1/files/0x000500000001a0da-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2020 2644 Create app.exe 31 PID 2644 wrote to memory of 2020 2644 Create app.exe 31 PID 2644 wrote to memory of 2020 2644 Create app.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Greber\Create app.exe"C:\Users\Admin\AppData\Local\Temp\Greber\Create app.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Greber\Create app.exe"C:\Users\Admin\AppData\Local\Temp\Greber\Create app.exe"2⤵
- Loads dropped DLL
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD564fe8415b07e0d06ce078d34c57a4e63
SHA1dd327f1a8ca83be584867aee0f25d11bff820a3d
SHA2565d5161773b5c7cc15bde027eabc1829c9d2d697903234e4dd8f7d1222f5fe931
SHA51255e84a5c0556dd485e7238a101520df451bb7aab7d709f91fdb0709fad04520e160ae394d79e601726c222c0f87a979d1c482ac84e2b037686cde284a0421c4d