Analysis
-
max time kernel
32s -
max time network
196s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01-07-2021 14:13
Static task
static1
Behavioral task
behavioral1
Sample
a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe
Resource
win10v20210410
General
-
Target
a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe
-
Size
421KB
-
MD5
ffff18fc7c2166c2a1a3c3d8bbd95ba1
-
SHA1
7af27ee542f599e4b68a032bc43295eec03c1e0e
-
SHA256
a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b
-
SHA512
3a36a1b6cf4b933cc546157b51a48e0b87fd1bc9fc41b5763500ecf89fca7017e2fdc721593ff6eaa2607b434c4d0133132460f1d090d5f459905f410a4c1435
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.execmd.exedescription pid process target process PID 1100 wrote to memory of 1676 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1676 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1676 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1676 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 664 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 664 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 664 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 664 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 556 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 556 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 556 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 556 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1516 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1516 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1516 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1100 wrote to memory of 1516 1100 a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe cmd.exe PID 1516 wrote to memory of 1748 1516 cmd.exe systeminfo.exe PID 1516 wrote to memory of 1748 1516 cmd.exe systeminfo.exe PID 1516 wrote to memory of 1748 1516 cmd.exe systeminfo.exe PID 1516 wrote to memory of 1748 1516 cmd.exe systeminfo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe"C:\Users\Admin\AppData\Local\Temp\a7a86cbf520c0ca37e2f8e37584fcd9c68e79614fd8352d10a7bb223c3a3a39b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\Desktop\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\Recent\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c dir C:\PROGRA~2\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵PID:556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c systeminfo >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\asd.docx2⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d78454a6255fe1cb8d7bbf30e19760a0
SHA18d896df9d2891403c528789b4db1bfc5983ddc05
SHA2569f6f510e547be626f51da665e20792504e2327f7ddcb695edf8504f0bff748ea
SHA51232227aea9382031d99026c948db8f37f624be4c5b1581bf12822b08bc16691a86b09902ccd0d1b9e83678a9de1b1821af79ca70de4ccf732f3e525468a4d19b4
-
MD5
15e5856a237c9e8c91672d408887ffe0
SHA1f787994f52c25df630ca6621e0af035a821a741d
SHA256b033a69e8bd98113c09f2dea6ff28b0fadfd5a862c29625d073f941acd3e80c0
SHA51220e3604c0c6e7d6894b5132b796702310d3089b254009882afcc12dbf29b7d42544a8a943edd33c0e1f1c48e7ae78f9f83e82d7679b7475a41fa342b8fd1ac2b
-
MD5
15e5856a237c9e8c91672d408887ffe0
SHA1f787994f52c25df630ca6621e0af035a821a741d
SHA256b033a69e8bd98113c09f2dea6ff28b0fadfd5a862c29625d073f941acd3e80c0
SHA51220e3604c0c6e7d6894b5132b796702310d3089b254009882afcc12dbf29b7d42544a8a943edd33c0e1f1c48e7ae78f9f83e82d7679b7475a41fa342b8fd1ac2b
-
MD5
0ba11dd7ebd82acf8eb8d46392972a43
SHA178ef34067da15f7e16d5372713c6502fb5604cce
SHA2561fd23c4af0ab23e2be329b2630b16aa2ad4c7ea5a42ec1ba4553e4f18d5d5505
SHA512741eb485333fcce39eede7cb5e6ecb5940c380e945760bd6867184a21e83896fd7ce615924c1a6f499afd4a8885ece97b5f049170602045b84e92cea50da0d0e