Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-01-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll
-
Size
105.8MB
-
MD5
e11e2425c62f34ebb3f640baeefb67d5
-
SHA1
7dc6f8aaaf4431c365564a51dd37c143d857b89e
-
SHA256
237deba138355bfb448e74bfb68fc868f4807b24d68715a6d47e348fc0cf9257
-
SHA512
a0739d0141b41bcec079de8fac6df70dc93100721ad1f04ef9cbbf52102ed4b7bbfd7f088618ce9ac939d8fa7d6837a0c822c303d55d7c7fb2d1221d13703e48
Score
10/10
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
resource yara_rule behavioral1/memory/700-70-0x00000000000DCC77-mapping.dmp golddragon_stage2 behavioral1/memory/700-69-0x00000000000D0000-0x0000000000129000-memory.dmp golddragon_stage2 behavioral1/memory/700-72-0x00000000000D0000-0x0000000000129000-memory.dmp golddragon_stage2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1180 set thread context of 700 1180 rundll32.exe 43 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 360 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1552 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1512 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 784 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 700 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 taskkill.exe Token: SeDebugPrivilege 360 tasklist.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1916 wrote to memory of 1180 1916 rundll32.exe 27 PID 1180 wrote to memory of 544 1180 rundll32.exe 28 PID 1180 wrote to memory of 544 1180 rundll32.exe 28 PID 1180 wrote to memory of 544 1180 rundll32.exe 28 PID 1180 wrote to memory of 544 1180 rundll32.exe 28 PID 544 wrote to memory of 784 544 cmd.exe 30 PID 544 wrote to memory of 784 544 cmd.exe 30 PID 544 wrote to memory of 784 544 cmd.exe 30 PID 544 wrote to memory of 784 544 cmd.exe 30 PID 1180 wrote to memory of 1116 1180 rundll32.exe 32 PID 1180 wrote to memory of 1116 1180 rundll32.exe 32 PID 1180 wrote to memory of 1116 1180 rundll32.exe 32 PID 1180 wrote to memory of 1116 1180 rundll32.exe 32 PID 1116 wrote to memory of 1552 1116 cmd.exe 34 PID 1116 wrote to memory of 1552 1116 cmd.exe 34 PID 1116 wrote to memory of 1552 1116 cmd.exe 34 PID 1116 wrote to memory of 1552 1116 cmd.exe 34 PID 1116 wrote to memory of 1208 1116 cmd.exe 35 PID 1116 wrote to memory of 1208 1116 cmd.exe 35 PID 1116 wrote to memory of 1208 1116 cmd.exe 35 PID 1116 wrote to memory of 1208 1116 cmd.exe 35 PID 1180 wrote to memory of 1216 1180 rundll32.exe 36 PID 1180 wrote to memory of 1216 1180 rundll32.exe 36 PID 1180 wrote to memory of 1216 1180 rundll32.exe 36 PID 1180 wrote to memory of 1216 1180 rundll32.exe 36 PID 1216 wrote to memory of 1512 1216 cmd.exe 38 PID 1216 wrote to memory of 1512 1216 cmd.exe 38 PID 1216 wrote to memory of 1512 1216 cmd.exe 38 PID 1216 wrote to memory of 1512 1216 cmd.exe 38 PID 1180 wrote to memory of 1700 1180 rundll32.exe 40 PID 1180 wrote to memory of 1700 1180 rundll32.exe 40 PID 1180 wrote to memory of 1700 1180 rundll32.exe 40 PID 1180 wrote to memory of 1700 1180 rundll32.exe 40 PID 1700 wrote to memory of 360 1700 cmd.exe 42 PID 1700 wrote to memory of 360 1700 cmd.exe 42 PID 1700 wrote to memory of 360 1700 cmd.exe 42 PID 1700 wrote to memory of 360 1700 cmd.exe 42 PID 1180 wrote to memory of 700 1180 rundll32.exe 43 PID 1180 wrote to memory of 700 1180 rundll32.exe 43 PID 1180 wrote to memory of 700 1180 rundll32.exe 43 PID 1180 wrote to memory of 700 1180 rundll32.exe 43 PID 1180 wrote to memory of 700 1180 rundll32.exe 43 PID 1180 wrote to memory of 700 1180 rundll32.exe 43
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\E11E2425C62F34EBB3F640BAEEFB67D5.exe.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1552
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:360
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:700
-
-