Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 13:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4fN.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4fN.dll
-
Size
353KB
-
MD5
9b6d2a2a3033be2c1e87fd39d35450c0
-
SHA1
091b44fc760055448b2e07247644a17692e1f62d
-
SHA256
290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4f
-
SHA512
68bcde0b6e9e4deb4e0fe351373e05d4c69bfec301f9d90c96e338f236ba9613c54abb55192d8a8c20af46ebc099fd052c51c68f07a0caa33cff02a8ca24aec2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Y:jDgtfRQUHPw06MoV2nwTBlhm8A
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4796 3148 rundll32.exe 83 PID 3148 wrote to memory of 4796 3148 rundll32.exe 83 PID 3148 wrote to memory of 4796 3148 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4fN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4fN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4796
-