Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 22:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3de9747c3cc5cf2c07f01313ac67e8db3d6cf97b2ccdd06dbbbe507ea5cf8c2a.dll
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
3de9747c3cc5cf2c07f01313ac67e8db3d6cf97b2ccdd06dbbbe507ea5cf8c2a.dll
-
Size
745KB
-
MD5
3f9f473314b462cc5de608d786ec4f9f
-
SHA1
bb4d280a50624150eac24169b08f4dc7cba10fd7
-
SHA256
3de9747c3cc5cf2c07f01313ac67e8db3d6cf97b2ccdd06dbbbe507ea5cf8c2a
-
SHA512
39c2ffd0b9f466c78ce4ea42344fc9a46dd157b017adbc40e9229347cc47450342468ad4c046a15bc68e567c2d854aebd493d2fd6222c3ed2bd70d563a43e5fb
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYf:o6RI1Fo/wT3cJYYYYYYYYYYYYf
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 2732 4720 rundll32.exe 83 PID 4720 wrote to memory of 2732 4720 rundll32.exe 83 PID 4720 wrote to memory of 2732 4720 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3de9747c3cc5cf2c07f01313ac67e8db3d6cf97b2ccdd06dbbbe507ea5cf8c2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3de9747c3cc5cf2c07f01313ac67e8db3d6cf97b2ccdd06dbbbe507ea5cf8c2a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2732
-