Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
87fddb1a10ce3006d4c922f3a6e8421b514e5b068e2bdc157a905656be322600N.dll
Resource
win7-20241023-en
windows7-x64
4 signatures
120 seconds
General
-
Target
87fddb1a10ce3006d4c922f3a6e8421b514e5b068e2bdc157a905656be322600N.dll
-
Size
1.0MB
-
MD5
29ac5dccf8a90beb34e8536d3dadf500
-
SHA1
dc70efb19f2348eb7ff3275e51354c72e3d71013
-
SHA256
87fddb1a10ce3006d4c922f3a6e8421b514e5b068e2bdc157a905656be322600
-
SHA512
5f497e35621fda626b646b68afb363c185c53fea546999d316a00d2c62c3955e7b958be0271f2eeccdc6a92d5ccd416073ff4c3a9d1ad2551d2feaa79809d459
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0y:jDgtfRQUHPw06MoV2nwTBlhm8K
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 748 2344 rundll32.exe 83 PID 2344 wrote to memory of 748 2344 rundll32.exe 83 PID 2344 wrote to memory of 748 2344 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87fddb1a10ce3006d4c922f3a6e8421b514e5b068e2bdc157a905656be322600N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87fddb1a10ce3006d4c922f3a6e8421b514e5b068e2bdc157a905656be322600N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:748
-