Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 16:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9cece57d7c6e00a4a7989fe7982c0d4eb423e7d8347cad38bd93818ec5198ab7N.dll
Resource
win7-20240708-en
windows7-x64
4 signatures
120 seconds
General
-
Target
9cece57d7c6e00a4a7989fe7982c0d4eb423e7d8347cad38bd93818ec5198ab7N.dll
-
Size
667KB
-
MD5
905d048f321d18f873b6426eaeafc460
-
SHA1
fbff0a1e94e3332ea4acc512d2bf169b4533bb14
-
SHA256
9cece57d7c6e00a4a7989fe7982c0d4eb423e7d8347cad38bd93818ec5198ab7
-
SHA512
92b8187abbe1ec6fc4ef0d6c0fbd8c3e3b5dc5784554d4ae9c57230bb4400b707c5a2f5fa27a012a72a34d37cb8a91b8d3de81f377c268fbdb7a1897914f5661
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYn:o6RI1Fo/wT3cJYYYYYYYYYYYYn
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1016 1972 rundll32.exe 83 PID 1972 wrote to memory of 1016 1972 rundll32.exe 83 PID 1972 wrote to memory of 1016 1972 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cece57d7c6e00a4a7989fe7982c0d4eb423e7d8347cad38bd93818ec5198ab7N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9cece57d7c6e00a4a7989fe7982c0d4eb423e7d8347cad38bd93818ec5198ab7N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1016
-