Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c6719996548f9b424ade1fdd8831fea7ae5a3b1a9bb6528eea66f78cf4a58aaN.dll
Resource
win7-20240708-en
windows7-x64
4 signatures
120 seconds
General
-
Target
2c6719996548f9b424ade1fdd8831fea7ae5a3b1a9bb6528eea66f78cf4a58aaN.dll
-
Size
807KB
-
MD5
56d39666a7e11a4ba1304662893e4160
-
SHA1
6fa71cf6bb9d873d4a837da7e1434957edca2d2d
-
SHA256
2c6719996548f9b424ade1fdd8831fea7ae5a3b1a9bb6528eea66f78cf4a58aa
-
SHA512
a6c022f664e9bf0928cf10e7d89ffd860426527ed0922a4ffd8baef41aa9ff211b68dad205819875c1a810569cd73ea9625ea6b8b8e03a5244224f3e4829b784
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYC:o6RI1Fo/wT3cJYYYYYYYYYYYYC
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3968 2668 rundll32.exe 85 PID 2668 wrote to memory of 3968 2668 rundll32.exe 85 PID 2668 wrote to memory of 3968 2668 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c6719996548f9b424ade1fdd8831fea7ae5a3b1a9bb6528eea66f78cf4a58aaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c6719996548f9b424ade1fdd8831fea7ae5a3b1a9bb6528eea66f78cf4a58aaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3968
-