Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 05:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
798d65ba837e71c4c4549206285aaa91e5c20ce37a22471782cbf0786bb52998N.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
798d65ba837e71c4c4549206285aaa91e5c20ce37a22471782cbf0786bb52998N.dll
-
Size
807KB
-
MD5
9bce3ce4593855c2a29579b039d85400
-
SHA1
e0e2b71812969496372a6b25564a3c7a2f79a219
-
SHA256
798d65ba837e71c4c4549206285aaa91e5c20ce37a22471782cbf0786bb52998
-
SHA512
09778cf3a81644871473d41cb2a148be6f9c029ce7c91c0cfa0b37de03f4b6f130c6f44d237df3bef1400a754dc0dd42bf2911a8e5c691338153573ab9430a21
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0T:jDgtfRQUHPw06MoV2nwTBlhm87
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 4272 2604 rundll32.exe 83 PID 2604 wrote to memory of 4272 2604 rundll32.exe 83 PID 2604 wrote to memory of 4272 2604 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\798d65ba837e71c4c4549206285aaa91e5c20ce37a22471782cbf0786bb52998N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\798d65ba837e71c4c4549206285aaa91e5c20ce37a22471782cbf0786bb52998N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4272
-