Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
be492a754e33e397f73d7a692e7e93c534f73f674d501e417bae77507557c042N.dll
Resource
win7-20241010-en
General
-
Target
be492a754e33e397f73d7a692e7e93c534f73f674d501e417bae77507557c042N.dll
-
Size
807KB
-
MD5
49dcdd8d01bbc85d5a731f7be71671e0
-
SHA1
10d6a9891fff4a3f1a62bdf21597b11502b96030
-
SHA256
be492a754e33e397f73d7a692e7e93c534f73f674d501e417bae77507557c042
-
SHA512
f276251f5e3a40f37343e9920922731aa3457b2457ace9bf29b356f73b401591ec01cf11e7d7d6d4c1bc536c48605cd65882595f73754e0be73caa24fb45153e
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYS:o6RI1Fo/wT3cJYYYYYYYYYYYYS
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3588 wrote to memory of 512 3588 rundll32.exe rundll32.exe PID 3588 wrote to memory of 512 3588 rundll32.exe rundll32.exe PID 3588 wrote to memory of 512 3588 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be492a754e33e397f73d7a692e7e93c534f73f674d501e417bae77507557c042N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be492a754e33e397f73d7a692e7e93c534f73f674d501e417bae77507557c042N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:512
-