Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 22:02

General

  • Target

    6ac98ad15378ee1e3bca7d6ce4999be6836962a45784fccc2d14cc86d2487f44.dll

  • Size

    383KB

  • MD5

    1b518c05604a3b61b0bd77a3e65781df

  • SHA1

    b9c175edf06724e53abc85acdb91d11e8a92add5

  • SHA256

    6ac98ad15378ee1e3bca7d6ce4999be6836962a45784fccc2d14cc86d2487f44

  • SHA512

    990a29db07677f7df1bdced99f8b325e1f4ee48a3087099678b0931ff00c475d75d9988aa9a934359394b800ca35cb607e9a7a2ebe431463c8759de108f737fc

  • SSDEEP

    3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0g:jDgtfRQUHPw06MoV2nwTBlhm8o

Score
10/10

Malware Config

Signatures

  • Yunsip

    Remote backdoor which communicates with a C2 server to receive commands.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ac98ad15378ee1e3bca7d6ce4999be6836962a45784fccc2d14cc86d2487f44.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ac98ad15378ee1e3bca7d6ce4999be6836962a45784fccc2d14cc86d2487f44.dll,#1
      2⤵
        PID:4376

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads