Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 07:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
71515d0385670d44c8e59c79720a1f2a52120d4e8b8e190dc95817de2ca16f2eN.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
71515d0385670d44c8e59c79720a1f2a52120d4e8b8e190dc95817de2ca16f2eN.dll
-
Size
747KB
-
MD5
45a5b22066c2205b2e1b9b96c5b4bd90
-
SHA1
1b836b45a056a19b4dd8db8af5c2e36d545c607d
-
SHA256
71515d0385670d44c8e59c79720a1f2a52120d4e8b8e190dc95817de2ca16f2e
-
SHA512
5d5ea434935c7d31f1c7f13fb3c83de0f4fe43a012ffdeb15f393b855660ff9eb54a19044b461fcd6048ecea179bb34b2c6a609ddfe9786f16f329be8dc4a354
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY/:o6RI1Fo/wT3cJYYYYYYYYYYYY/
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 2432 988 rundll32.exe 83 PID 988 wrote to memory of 2432 988 rundll32.exe 83 PID 988 wrote to memory of 2432 988 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71515d0385670d44c8e59c79720a1f2a52120d4e8b8e190dc95817de2ca16f2eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71515d0385670d44c8e59c79720a1f2a52120d4e8b8e190dc95817de2ca16f2eN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2432
-