Analysis
-
max time kernel
29s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
01-07-2021 14:14
Static task
static1
Behavioral task
behavioral1
Sample
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
Resource
win10v20210408
General
-
Target
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe
-
Size
487KB
-
MD5
dd15c9f2669bce96098b3f7fa791c87d
-
SHA1
51d4122fa2c6ba1fea93845b28f5f872fe64d394
-
SHA256
70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569
-
SHA512
f26aa6c7375af8fee7d6508dec9d8505f82fdab424bc76fbc6a02919101ccbde059b73d1c4ae1e49f2e252b6f07c4091882674a5cfb039988a68d8f638c8cb23
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 408 systeminfo.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 196 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 776 wrote to memory of 2260 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 76 PID 776 wrote to memory of 2260 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 76 PID 776 wrote to memory of 2260 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 76 PID 776 wrote to memory of 1336 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 78 PID 776 wrote to memory of 1336 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 78 PID 776 wrote to memory of 1336 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 78 PID 776 wrote to memory of 2480 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 82 PID 776 wrote to memory of 2480 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 82 PID 776 wrote to memory of 2480 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 82 PID 776 wrote to memory of 2296 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 84 PID 776 wrote to memory of 2296 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 84 PID 776 wrote to memory of 2296 776 70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe 84 PID 2296 wrote to memory of 408 2296 cmd.exe 86 PID 2296 wrote to memory of 408 2296 cmd.exe 86 PID 2296 wrote to memory of 408 2296 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe"C:\Users\Admin\AppData\Local\Temp\70298c1bfc6b8e07c0600f9264712211bcc7b57b28853d8143f249639cdf6569.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\Desktop\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:2260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\Recent\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\PROGRA~2\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:2480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c systeminfo >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:408
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:196