Analysis

  • max time kernel
    36s
  • max time network
    49s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    18-05-2021 11:57

General

  • Target

    1ca4ab13a9181f897702dbee23a154d8f552bb147d39c2dee3f0e1f3d9a444a9.dll

  • Size

    1013KB

  • MD5

    afbd34604bd8366e510f4f61cd3df112

  • SHA1

    16193d2e0bee2d99ad62f91d92177f8730601e55

  • SHA256

    1ca4ab13a9181f897702dbee23a154d8f552bb147d39c2dee3f0e1f3d9a444a9

  • SHA512

    5d9db070e7cb2c5a3dc7189c71aac849aea08bf93828c370819ff4c34d74cea0662e3baad2cdb62987999f4679fd261524b0d54296d7ee726229b0337ca25027

Score
10/10

Malware Config

Signatures

  • Yunsip

    Remote backdoor which communicates with a C2 server to receive commands.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1ca4ab13a9181f897702dbee23a154d8f552bb147d39c2dee3f0e1f3d9a444a9.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1ca4ab13a9181f897702dbee23a154d8f552bb147d39c2dee3f0e1f3d9a444a9.dll,#1
      2⤵
        PID:1556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1556-114-0x0000000000000000-mapping.dmp