Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
9ba185ae51b91342eff46b075cdb4eafdccc64d9fc66783bfb8c855e26a8cf7b.dll
Resource
win7-20240903-en
General
-
Target
9ba185ae51b91342eff46b075cdb4eafdccc64d9fc66783bfb8c855e26a8cf7b.dll
-
Size
667KB
-
MD5
7ef9443d4c16f78b11dbbc3ae22bbc2a
-
SHA1
12df999f2d5b2ed4122eebe02560b241d2f146c5
-
SHA256
9ba185ae51b91342eff46b075cdb4eafdccc64d9fc66783bfb8c855e26a8cf7b
-
SHA512
6b0a04759c6a1c6b1ddc1d584251daf7e53c70d601a9121d1c857049caf2760f56a71e11fcbafdcacc1a756b65efe9c466dace853d474ed64e7b8cc0463be064
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY1:o6RI1Fo/wT3cJYYYYYYYYYYYY1
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe PID 2932 wrote to memory of 3020 2932 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ba185ae51b91342eff46b075cdb4eafdccc64d9fc66783bfb8c855e26a8cf7b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ba185ae51b91342eff46b075cdb4eafdccc64d9fc66783bfb8c855e26a8cf7b.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3020
-