Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Greber/Create app.exe
windows7-x64
7Greber/Create app.exe
windows10-2004-x64
8Greber/GH ...64.dll
windows7-x64
1Greber/GH ...64.dll
windows10-2004-x64
1Greber/GH ...86.dll
windows7-x64
3Greber/GH ...86.dll
windows10-2004-x64
3Greber/GH ...64.exe
windows7-x64
1Greber/GH ...64.exe
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 23:45
Behavioral task
behavioral1
Sample
Greber/Create app.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Greber/Create app.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Greber/GH Injector - x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Greber/GH Injector - x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Greber/GH Injector - x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Greber/GH Injector - x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Greber/GH Injector SWHEX - x64.exe
Resource
win10v2004-20241007-en
General
-
Target
Greber/GH Injector - x86.dll
-
Size
54KB
-
MD5
a90f82ec592f7d7bafe379947bc976ef
-
SHA1
fde0997a72c95d4c37fbaf0d47b2d35782c9695f
-
SHA256
57fe4aac342425fe7f1c24600b3c9781ce9f73e98905df5858480cb8ca8ea631
-
SHA512
d7f0738ef1e495546c5eee00270cb95cd453a832d00066625aa9a87a9ea0319399118d81796b8aff02002df63b773ca9392ea24b5792d55f158e9560eb832dd2
-
SSDEEP
768:ow+gyUC/9zDP1XO5mvQRI6qqsciMCUX8VzK3+nO+t4YZQ8AN7zPkFg8s/4PU:CL/5KDHrC08VzK3+nO+t4YypCgbz
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3488 1328 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1328 4460 rundll32.exe 84 PID 4460 wrote to memory of 1328 4460 rundll32.exe 84 PID 4460 wrote to memory of 1328 4460 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Greber\GH Injector - x86.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Greber\GH Injector - x86.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 6203⤵
- Program crash
PID:3488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1328 -ip 13281⤵PID:4868