Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
080b3bc0133063474989f8d51d5ed59453823a3b3a98cee987e8df1046caba4aN.dll
Resource
win7-20240903-en
General
-
Target
080b3bc0133063474989f8d51d5ed59453823a3b3a98cee987e8df1046caba4aN.dll
-
Size
762KB
-
MD5
1f22aad5c386becf28dacdaf1d90cf60
-
SHA1
3ce2aa2add48055b7e69f3ae413e957fc04fa2b5
-
SHA256
080b3bc0133063474989f8d51d5ed59453823a3b3a98cee987e8df1046caba4a
-
SHA512
610429f402cc34de00be82b7bba0f2e14bb09436312997b0a1ce41fcce26ad01f203b01bbaf683ccda0efd23e490003a7698e4e08ba51a96d1fbc638da81d755
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0j:jDgtfRQUHPw06MoV2nwTBlhm8b
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4788 wrote to memory of 1408 4788 rundll32.exe 83 PID 4788 wrote to memory of 1408 4788 rundll32.exe 83 PID 4788 wrote to memory of 1408 4788 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\080b3bc0133063474989f8d51d5ed59453823a3b3a98cee987e8df1046caba4aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\080b3bc0133063474989f8d51d5ed59453823a3b3a98cee987e8df1046caba4aN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1408
-