Overview
overview
10Static
static
10Greber/Create app.exe
windows7-x64
7Greber/Create app.exe
windows10-2004-x64
8Greber/GH ...64.dll
windows7-x64
1Greber/GH ...64.dll
windows10-2004-x64
1Greber/GH ...86.dll
windows7-x64
3Greber/GH ...86.dll
windows10-2004-x64
3Greber/GH ...64.exe
windows7-x64
1Greber/GH ...64.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 23:45
Behavioral task
behavioral1
Sample
Greber/Create app.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Greber/Create app.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Greber/GH Injector - x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Greber/GH Injector - x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Greber/GH Injector - x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Greber/GH Injector - x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win10v2004-20241007-en
General
-
Target
Greber/GH Injector - x86.dll
-
Size
54KB
-
MD5
a90f82ec592f7d7bafe379947bc976ef
-
SHA1
fde0997a72c95d4c37fbaf0d47b2d35782c9695f
-
SHA256
57fe4aac342425fe7f1c24600b3c9781ce9f73e98905df5858480cb8ca8ea631
-
SHA512
d7f0738ef1e495546c5eee00270cb95cd453a832d00066625aa9a87a9ea0319399118d81796b8aff02002df63b773ca9392ea24b5792d55f158e9560eb832dd2
-
SSDEEP
768:ow+gyUC/9zDP1XO5mvQRI6qqsciMCUX8VzK3+nO+t4YZQ8AN7zPkFg8s/4PU:CL/5KDHrC08VzK3+nO+t4YypCgbz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31 PID 2124 wrote to memory of 2880 2124 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Greber\GH Injector - x86.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Greber\GH Injector - x86.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2880
-