Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d6ba44d56611edaa6d9f4cbad5632a8b4f1c4b48cef1a8c25be55207c0bfa9ad.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
d6ba44d56611edaa6d9f4cbad5632a8b4f1c4b48cef1a8c25be55207c0bfa9ad.dll
-
Size
989KB
-
MD5
73c29f9d61d9ce1f2e946aece08f4cd2
-
SHA1
635552f3c01ea9893947f62528540a6426eceb64
-
SHA256
d6ba44d56611edaa6d9f4cbad5632a8b4f1c4b48cef1a8c25be55207c0bfa9ad
-
SHA512
779aa8bbaf2264903fd54174acabc636fb0e9cc07b466446837a468a3e1f65419f7965fbcd36c503060dab3d9acf7a67697da3da52d7e078cf23653fcabbd43e
-
SSDEEP
3072:o6pU5Y1DXnbMn7Uzkop61/dAzV2O3XwTBftrm2YedGf3QKZDq:o6C5AXbMn7UI1FoV2gwTBlrIckPY
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 4668 2036 rundll32.exe 83 PID 2036 wrote to memory of 4668 2036 rundll32.exe 83 PID 2036 wrote to memory of 4668 2036 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6ba44d56611edaa6d9f4cbad5632a8b4f1c4b48cef1a8c25be55207c0bfa9ad.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6ba44d56611edaa6d9f4cbad5632a8b4f1c4b48cef1a8c25be55207c0bfa9ad.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4668
-