Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 20:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6aa0e63a9a02ab4f3c583e5d84761cd0b5f11b19875f985607dd75d6a78f4df5N.dll
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
6aa0e63a9a02ab4f3c583e5d84761cd0b5f11b19875f985607dd75d6a78f4df5N.dll
-
Size
520KB
-
MD5
1cec7f335ad2cc3d008d465c84956ef0
-
SHA1
fa05257237df1fa2702ed9ca7629338308120aed
-
SHA256
6aa0e63a9a02ab4f3c583e5d84761cd0b5f11b19875f985607dd75d6a78f4df5
-
SHA512
dd17208f61ac7650a49344ae7d79dfd7a8d539fc965f1fd1b166ae45f1631edf03f29540fe3d689d4f5aec9c4526e4033a8901cf7fc380671a205df204bafcc8
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0t:jDgtfRQUHPw06MoV2nwTBlhm8l
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 996 wrote to memory of 5008 996 rundll32.exe 86 PID 996 wrote to memory of 5008 996 rundll32.exe 86 PID 996 wrote to memory of 5008 996 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa0e63a9a02ab4f3c583e5d84761cd0b5f11b19875f985607dd75d6a78f4df5N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa0e63a9a02ab4f3c583e5d84761cd0b5f11b19875f985607dd75d6a78f4df5N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5008
-