Analysis
-
max time kernel
30s -
max time network
182s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01-07-2021 14:14
Static task
static1
Behavioral task
behavioral1
Sample
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
Resource
win10v20210408
General
-
Target
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
-
Size
487KB
-
MD5
dd15c9f2669bce96098b3f7fa791c87d
-
SHA1
51d4122fa2c6ba1fea93845b28f5f872fe64d394
-
SHA256
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569
-
SHA512
f26aa6c7375af8fee7d6508dec9d8505f82fdab424bc76fbc6a02919101ccbde059b73d1c4ae1e49f2e252b6f07c4091882674a5cfb039988a68d8f638c8cb23
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.execmd.exedescription pid process target process PID 1644 wrote to memory of 1908 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1908 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1908 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1908 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 2032 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 2032 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 2032 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 2032 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1292 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1292 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1292 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1292 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1784 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1784 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1784 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1644 wrote to memory of 1784 1644 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe cmd.exe PID 1784 wrote to memory of 1060 1784 cmd.exe systeminfo.exe PID 1784 wrote to memory of 1060 1784 cmd.exe systeminfo.exe PID 1784 wrote to memory of 1060 1784 cmd.exe systeminfo.exe PID 1784 wrote to memory of 1060 1784 cmd.exe systeminfo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe"C:\Users\Admin\AppData\Local\Temp\70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\Desktop\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:1908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\Recent\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\PROGRA~2\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:1292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c systeminfo >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1060
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c20cff16d4d6d92395427c1b6644ada0
SHA196973c34d87ff0e4c0c38929c6241bafcd27b080
SHA25640e11799265b79540139b935e0aa4d6336ece4fb48f5bdb604c7bec9cc26630b
SHA5125d0d3d2a2708c6612618d9cc81e8fb04230af7d415881660caab784f7e703a24ddbc11e38a14db1f31b96239b99b96e58d9042276452ccc5965faa66810a0884
-
MD5
52f085cd779c06ed67d7bcad1115af8d
SHA159f951d16f8085574cf17015a5fa43082203d055
SHA256af742524111ae7207ef3449c47e43d0955af20455d3f8f5afc3e3f24d5249107
SHA512aca40144015059fbe6c8081cfe368adb8c7818f558f19480c61c9d062dbd5bc1770828affc00c92049f83d1cb1733d6f7815733a54466c0fe648562da4ab1da1
-
MD5
52f085cd779c06ed67d7bcad1115af8d
SHA159f951d16f8085574cf17015a5fa43082203d055
SHA256af742524111ae7207ef3449c47e43d0955af20455d3f8f5afc3e3f24d5249107
SHA512aca40144015059fbe6c8081cfe368adb8c7818f558f19480c61c9d062dbd5bc1770828affc00c92049f83d1cb1733d6f7815733a54466c0fe648562da4ab1da1
-
MD5
cd91289c21261ce818929fbc9592f970
SHA12768eab6942277a7b23f0a6189b259850e2dd902
SHA256f8eec4ffeed9b4e8505c0ab454e4d23c862650d5ad93b4b13bf749a2a8c79aaa
SHA5129fba3568a1eed076680bc9ed82d0b16f4f26f430ddb44350ecacccba8d3b3ce4baecf59708192d8606fa97fb06cc54ff2a0be274b5020554a3117d0443fd6327