Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-01-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll
Resource
win7-en-20211208
General
-
Target
E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll
-
Size
105.8MB
-
MD5
e11e2425c62f34ebb3f640baeefb67d5
-
SHA1
7dc6f8aaaf4431c365564a51dd37c143d857b89e
-
SHA256
237deba138355bfb448e74bfb68fc868f4807b24d68715a6d47e348fc0cf9257
-
SHA512
a0739d0141b41bcec079de8fac6df70dc93100721ad1f04ef9cbbf52102ed4b7bbfd7f088618ce9ac939d8fa7d6837a0c822c303d55d7c7fb2d1221d13703e48
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Processes:
resource yara_rule behavioral1/memory/700-70-0x00000000000DCC77-mapping.dmp golddragon_stage2 behavioral1/memory/700-69-0x00000000000D0000-0x0000000000129000-memory.dmp golddragon_stage2 behavioral1/memory/700-72-0x00000000000D0000-0x0000000000129000-memory.dmp golddragon_stage2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1180 set thread context of 700 1180 rundll32.exe svchost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1552 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 784 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 700 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetasklist.exedescription pid process Token: SeDebugPrivilege 784 taskkill.exe Token: SeDebugPrivilege 360 tasklist.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 1180 1916 rundll32.exe rundll32.exe PID 1180 wrote to memory of 544 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 544 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 544 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 544 1180 rundll32.exe cmd.exe PID 544 wrote to memory of 784 544 cmd.exe taskkill.exe PID 544 wrote to memory of 784 544 cmd.exe taskkill.exe PID 544 wrote to memory of 784 544 cmd.exe taskkill.exe PID 544 wrote to memory of 784 544 cmd.exe taskkill.exe PID 1180 wrote to memory of 1116 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1116 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1116 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1116 1180 rundll32.exe cmd.exe PID 1116 wrote to memory of 1552 1116 cmd.exe ipconfig.exe PID 1116 wrote to memory of 1552 1116 cmd.exe ipconfig.exe PID 1116 wrote to memory of 1552 1116 cmd.exe ipconfig.exe PID 1116 wrote to memory of 1552 1116 cmd.exe ipconfig.exe PID 1116 wrote to memory of 1208 1116 cmd.exe ARP.EXE PID 1116 wrote to memory of 1208 1116 cmd.exe ARP.EXE PID 1116 wrote to memory of 1208 1116 cmd.exe ARP.EXE PID 1116 wrote to memory of 1208 1116 cmd.exe ARP.EXE PID 1180 wrote to memory of 1216 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1216 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1216 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1216 1180 rundll32.exe cmd.exe PID 1216 wrote to memory of 1512 1216 cmd.exe systeminfo.exe PID 1216 wrote to memory of 1512 1216 cmd.exe systeminfo.exe PID 1216 wrote to memory of 1512 1216 cmd.exe systeminfo.exe PID 1216 wrote to memory of 1512 1216 cmd.exe systeminfo.exe PID 1180 wrote to memory of 1700 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1700 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1700 1180 rundll32.exe cmd.exe PID 1180 wrote to memory of 1700 1180 rundll32.exe cmd.exe PID 1700 wrote to memory of 360 1700 cmd.exe tasklist.exe PID 1700 wrote to memory of 360 1700 cmd.exe tasklist.exe PID 1700 wrote to memory of 360 1700 cmd.exe tasklist.exe PID 1700 wrote to memory of 360 1700 cmd.exe tasklist.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe PID 1180 wrote to memory of 700 1180 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1552
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ccaec4ba5926458cf1ff3f11ef0b2eb2
SHA1849a508ff4981c7e06bdeb56eaaeb1bdcfb7af26
SHA25697d2b06e9807e176b84415284631cedbc4ba13f00521fba4827c3ceeea3de031
SHA51293b79d3ea1496380644d288b4b1b434c9ed6abd6cf9e210862f14622a0e4d6c6be178e7d25ea7042174b14c6745a6b08236adc95aaf426d349b7772d95164912
-
MD5
5b4c3b3a75ae01b2f7bef6f7d4da9a9d
SHA188d5fe4965d59454dd36bf025782368de2acba54
SHA256691cf500c9ae9d87e32641fdeaf50da896e0621b1af87afb70f4d375b4702978
SHA512f28812f72a3462f4bc6ff6b4b0d9f7b089ba294510e782035c68abd30c0de8ba7193d97d1f11bc1a46dbe4d7ce6cf98de36890f104e6a69b21a61b474e9cb109