Analysis
-
max time kernel
94s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 05:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c148a6ddeb51d4fc0de56eb6deb96a1c05ac8a06df637bb15865ba039f23172e.dll
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
c148a6ddeb51d4fc0de56eb6deb96a1c05ac8a06df637bb15865ba039f23172e.dll
-
Size
527KB
-
MD5
bcf491672604b7fe0732f3a09ff7eaef
-
SHA1
3773871bce8eb7c45d787de166720520df965c84
-
SHA256
c148a6ddeb51d4fc0de56eb6deb96a1c05ac8a06df637bb15865ba039f23172e
-
SHA512
7b99c9bcda9276b4b0d354f6d01f33117adffa032c45400057d751ee852b01f47c52e9bfa78145e4f39c9aa1c3504751aa5de3e89576a729d7b73ad0702f3743
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0K:jDgtfRQUHPw06MoV2nwTBlhm8i
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5560 wrote to memory of 804 5560 rundll32.exe 85 PID 5560 wrote to memory of 804 5560 rundll32.exe 85 PID 5560 wrote to memory of 804 5560 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c148a6ddeb51d4fc0de56eb6deb96a1c05ac8a06df637bb15865ba039f23172e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c148a6ddeb51d4fc0de56eb6deb96a1c05ac8a06df637bb15865ba039f23172e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:804
-