Overview
overview
10Static
static
3ga/EXTERIUM.dll
windows7-x64
3ga/EXTERIUM.dll
windows10-2004-x64
3ga/GH Inje...64.dll
windows7-x64
1ga/GH Inje...64.dll
windows10-2004-x64
1ga/GH Inje...64.exe
windows7-x64
7ga/GH Inje...64.exe
windows10-2004-x64
10ga/GH Inje...86.dll
windows7-x64
3ga/GH Inje...86.dll
windows10-2004-x64
3ga/GH Inje...64.exe
windows7-x64
1ga/GH Inje...64.exe
windows10-2004-x64
1ga/undtct.dll
windows7-x64
3ga/undtct.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
ga/EXTERIUM.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ga/EXTERIUM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ga/GH Injector - x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ga/GH Injector - x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ga/GH Injector - x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ga/GH Injector - x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ga/GH Injector - x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ga/GH Injector - x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ga/GH Injector SWHEX - x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ga/GH Injector SWHEX - x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ga/undtct.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ga/undtct.dll
Resource
win10v2004-20241007-en
General
-
Target
ga/undtct.dll
-
Size
1015KB
-
MD5
3e9e02ce2b577d62b35c34aa6ec027e2
-
SHA1
9c464e6edc2e6a4bc17d28a68d5217a134b8f368
-
SHA256
2c81fcf3f79f98c78963da78d234dcf6dd36c9503438121d384b39edb0ca272b
-
SHA512
7eb9a3580ce664e78ccf89130581de6e5e816337f4953b192038baafd7ad163a096250aa2f93f4dab68dfec0e25987845777f70d37afd37bab73e793e680f68c
-
SSDEEP
12288:Cab/0Xn458xRrPzrUBHK5fhgxFmXEP2f7K46TnSEl1yt6zzng0LNU5w37A6Dv:ClXn458xRrPztgxoGRNU5w37J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2312 2372 rundll32.exe 83 PID 2372 wrote to memory of 2312 2372 rundll32.exe 83 PID 2372 wrote to memory of 2312 2372 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ga\undtct.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ga\undtct.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2312
-