Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:17
Static task
static1
Behavioral task
behavioral1
Sample
a32bea41d0794e2e3108f1150fa5dc5079f93dc4c67460174c5211cb7c1e1041.dll
Resource
win7-20241023-en
General
-
Target
a32bea41d0794e2e3108f1150fa5dc5079f93dc4c67460174c5211cb7c1e1041.dll
-
Size
1.1MB
-
MD5
ed7365dbc76d9f886824453df2f9f934
-
SHA1
61405bb2bc6a546e112e8ed76cd145130c71f70e
-
SHA256
a32bea41d0794e2e3108f1150fa5dc5079f93dc4c67460174c5211cb7c1e1041
-
SHA512
6b3afbffd1ae76fad63d40f00f0b346c75b560b9464309a2bfee677bb5ee935fbd989ca7586b5bf8b0ee64d6be310a1a684acb1c9c6349e41e743e1f8ad299b1
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYC:o6RI1Fo/wT3cJYYYYYYYYYYYYC
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4380 wrote to memory of 4080 4380 rundll32.exe 83 PID 4380 wrote to memory of 4080 4380 rundll32.exe 83 PID 4380 wrote to memory of 4080 4380 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a32bea41d0794e2e3108f1150fa5dc5079f93dc4c67460174c5211cb7c1e1041.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a32bea41d0794e2e3108f1150fa5dc5079f93dc4c67460174c5211cb7c1e1041.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4080
-