Analysis
-
max time kernel
91s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
d79485f9aed1f3b915e1f9ba5609214eabeb0ec90c54f154a98d61a026d45a84.dll
Resource
win7-20241023-en
General
-
Target
d79485f9aed1f3b915e1f9ba5609214eabeb0ec90c54f154a98d61a026d45a84.dll
-
Size
502KB
-
MD5
73441507b92d29512bee29039da0d31a
-
SHA1
3d761ba54121b83b409195263b6e975fae932ec4
-
SHA256
d79485f9aed1f3b915e1f9ba5609214eabeb0ec90c54f154a98d61a026d45a84
-
SHA512
93e5995050d240621514eaaa1089e128b3ef193f1d48a79081784a88ee9a9e5d48a4dbc258c8cbbad6492bf9a5f34419a5cef27db3b4783da80f044bdb215cb2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0I:jDgtfRQUHPw06MoV2nwTBlhm8A
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1392 wrote to memory of 4220 1392 rundll32.exe rundll32.exe PID 1392 wrote to memory of 4220 1392 rundll32.exe rundll32.exe PID 1392 wrote to memory of 4220 1392 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d79485f9aed1f3b915e1f9ba5609214eabeb0ec90c54f154a98d61a026d45a84.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d79485f9aed1f3b915e1f9ba5609214eabeb0ec90c54f154a98d61a026d45a84.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4220
-