Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 02:26

General

  • Target

    66b3baa6408193b5119a4ee5a91499437a0b4ce8c1bab0509960a3ee465f2760.dll

  • Size

    600KB

  • MD5

    973730150a09e74de859791756936365

  • SHA1

    19b2661f358e1ac0b252c5028448287635d53191

  • SHA256

    66b3baa6408193b5119a4ee5a91499437a0b4ce8c1bab0509960a3ee465f2760

  • SHA512

    37e0ddc22aea9c20e2825adee5d9dd01f1aca8026f45742e880ed2eae3e4dea0c4b95dde2a5026abc57090f624e5adb51b369136503771cda1369ca9d038d160

  • SSDEEP

    3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q07:jDgtfRQUHPw06MoV2nwTBlhm8j

Malware Config

Signatures

  • Yunsip

    Remote backdoor which communicates with a C2 server to receive commands.

  • Yunsip family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\66b3baa6408193b5119a4ee5a91499437a0b4ce8c1bab0509960a3ee465f2760.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\66b3baa6408193b5119a4ee5a91499437a0b4ce8c1bab0509960a3ee465f2760.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads