Analysis
-
max time kernel
123s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
03-11-2021 12:20
Static task
static1
Behavioral task
behavioral1
Sample
3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5.dll
Resource
win10-en-20211014
General
-
Target
3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5.dll
-
Size
481KB
-
MD5
e647b3366dc836c1f63bdc5ba2aef3a9
-
SHA1
a7b0711b45081768817e85d6fc76e23093093f87
-
SHA256
3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5
-
SHA512
39166d31017b238b4cae861ab263e3dd11260c0203fc8dcfd41461f3b850126ba954bcf9fb7678ceb63dc2e2f252bd6e20f7f33aed1a81db8c0d89c56be5dfcb
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Processes:
resource yara_rule behavioral2/memory/1208-127-0x00000000008E0000-0x0000000000939000-memory.dmp golddragon_stage2 behavioral2/memory/1208-128-0x00000000008ECC77-mapping.dmp golddragon_stage2 behavioral2/memory/1208-129-0x00000000008E0000-0x0000000000939000-memory.dmp golddragon_stage2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2268 set thread context of 1208 2268 rundll32.exe svchost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1100 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1132 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 1208 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetasklist.exedescription pid process Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 2372 tasklist.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1516 wrote to memory of 2268 1516 rundll32.exe rundll32.exe PID 1516 wrote to memory of 2268 1516 rundll32.exe rundll32.exe PID 1516 wrote to memory of 2268 1516 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2120 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 2120 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 2120 2268 rundll32.exe cmd.exe PID 2120 wrote to memory of 1132 2120 cmd.exe taskkill.exe PID 2120 wrote to memory of 1132 2120 cmd.exe taskkill.exe PID 2120 wrote to memory of 1132 2120 cmd.exe taskkill.exe PID 2268 wrote to memory of 3092 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 3092 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 3092 2268 rundll32.exe cmd.exe PID 3092 wrote to memory of 1100 3092 cmd.exe ipconfig.exe PID 3092 wrote to memory of 1100 3092 cmd.exe ipconfig.exe PID 3092 wrote to memory of 1100 3092 cmd.exe ipconfig.exe PID 3092 wrote to memory of 1148 3092 cmd.exe ARP.EXE PID 3092 wrote to memory of 1148 3092 cmd.exe ARP.EXE PID 3092 wrote to memory of 1148 3092 cmd.exe ARP.EXE PID 2268 wrote to memory of 3996 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 3996 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 3996 2268 rundll32.exe cmd.exe PID 3996 wrote to memory of 620 3996 cmd.exe systeminfo.exe PID 3996 wrote to memory of 620 3996 cmd.exe systeminfo.exe PID 3996 wrote to memory of 620 3996 cmd.exe systeminfo.exe PID 2268 wrote to memory of 2624 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 2624 2268 rundll32.exe cmd.exe PID 2268 wrote to memory of 2624 2268 rundll32.exe cmd.exe PID 2624 wrote to memory of 2372 2624 cmd.exe tasklist.exe PID 2624 wrote to memory of 2372 2624 cmd.exe tasklist.exe PID 2624 wrote to memory of 2372 2624 cmd.exe tasklist.exe PID 2268 wrote to memory of 1208 2268 rundll32.exe svchost.exe PID 2268 wrote to memory of 1208 2268 rundll32.exe svchost.exe PID 2268 wrote to memory of 1208 2268 rundll32.exe svchost.exe PID 2268 wrote to memory of 1208 2268 rundll32.exe svchost.exe PID 2268 wrote to memory of 1208 2268 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1100
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:620
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
48af694199ef9ddf593fcd19b288dc58
SHA17340622bda45e10f7046ba6391cdcadf7ebf51c9
SHA2567cd357a5708cd8621923e1e095b5e981a50a9c695cb164fc653bd24bea4ea1a9
SHA512fa0691eaad7e050166402222e640602cc3f24245fb699a89a52a6e98cd82e722d02a5f369ff1556ebacfda74920f3cdb9198177887575a27634506c893b2dfa8
-
MD5
823dcc04042f33b7fa3340ca72a5226a
SHA144e31ab3d1377120c90c8e82805987e9435d3b5b
SHA256fa4ab1aa6838e8344211b78ec41ecd3dcd84c4d04b578d2008e2f8f68fda820c
SHA512e1707a37bde300ecb62ed762d4b219c03c500675c60eeb7a5619b9d7209d38344977ca2c1f86fca9a21b972e59bafae01633d14de4b9ffc96b603010603cc30e