Analysis
-
max time kernel
100s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 08:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
71d534030e59b5c0de6f4e85b9fe9c90917f66f4cffc3ed5b8549c991f5c1c76.dll
Resource
win7-20240903-en
4 signatures
120 seconds
General
-
Target
71d534030e59b5c0de6f4e85b9fe9c90917f66f4cffc3ed5b8549c991f5c1c76.dll
-
Size
520KB
-
MD5
1c4c1d82c273e884c90e5afe5cc5e1fc
-
SHA1
3b40c7032d109f18d4dbdfe76c8cb7aae41ba0e2
-
SHA256
71d534030e59b5c0de6f4e85b9fe9c90917f66f4cffc3ed5b8549c991f5c1c76
-
SHA512
ff1d1c3fd0360fd3fa75b2b2b70af3436b218c3d5eeffc02dbe70bfdd22f5f967b0571b8766cf396af0b3d0becc8f7492a0a84bff89e388335957f30e03acda5
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0N:jDgtfRQUHPw06MoV2nwTBlhm8F
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4808 4856 rundll32.exe 86 PID 4856 wrote to memory of 4808 4856 rundll32.exe 86 PID 4856 wrote to memory of 4808 4856 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71d534030e59b5c0de6f4e85b9fe9c90917f66f4cffc3ed5b8549c991f5c1c76.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71d534030e59b5c0de6f4e85b9fe9c90917f66f4cffc3ed5b8549c991f5c1c76.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4808
-