Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 01:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
175a8e1eb98aba52ebcc3797719a71557f34559be648abab181bb7064b846ed9N.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
175a8e1eb98aba52ebcc3797719a71557f34559be648abab181bb7064b846ed9N.dll
-
Size
1.1MB
-
MD5
a984023cd660cfa96bb2db9ce69cada0
-
SHA1
49c4bae6b8a89fd7316dab500fe4d370ed480345
-
SHA256
175a8e1eb98aba52ebcc3797719a71557f34559be648abab181bb7064b846ed9
-
SHA512
f84426497a07213fe5c32240dd854c2e111dba9f9c373f01f6e731ecb5fe01c19a98245577340e5eeb20062cb615d718325007ca5dbffe5f1f309d1f1e447415
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY2:o6RI1Fo/wT3cJYYYYYYYYYYYY2
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 5084 2308 rundll32.exe 83 PID 2308 wrote to memory of 5084 2308 rundll32.exe 83 PID 2308 wrote to memory of 5084 2308 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\175a8e1eb98aba52ebcc3797719a71557f34559be648abab181bb7064b846ed9N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\175a8e1eb98aba52ebcc3797719a71557f34559be648abab181bb7064b846ed9N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5084
-