Analysis
-
max time kernel
107s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 03:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7699ac279a66795ed30225116e78a8ff344276639c0ccb13cc2c4d8d2579409N.dll
Resource
win7-20250207-en
4 signatures
120 seconds
General
-
Target
b7699ac279a66795ed30225116e78a8ff344276639c0ccb13cc2c4d8d2579409N.dll
-
Size
526KB
-
MD5
1b4835862c160ba8a93a0a0dae238680
-
SHA1
59b4156a4e8149c5aa68636f4e15d6e9740a9320
-
SHA256
b7699ac279a66795ed30225116e78a8ff344276639c0ccb13cc2c4d8d2579409
-
SHA512
cc3e9a848e1eab1f62c1d8352ddc491c78bfefd1b7c53791103ac57d5b281aa2de92d3eaba72b6a533ca2d449406530ed966e3f255c253ecf64c8d2757d1fc13
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0d:jDgtfRQUHPw06MoV2nwTBlhm8V
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 1704 4580 rundll32.exe 86 PID 4580 wrote to memory of 1704 4580 rundll32.exe 86 PID 4580 wrote to memory of 1704 4580 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7699ac279a66795ed30225116e78a8ff344276639c0ccb13cc2c4d8d2579409N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7699ac279a66795ed30225116e78a8ff344276639c0ccb13cc2c4d8d2579409N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1704
-