Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 17:52
Static task
static1
Behavioral task
behavioral1
Sample
bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll
Resource
win10-en-20211208
General
-
Target
bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll
-
Size
366KB
-
MD5
e69294040dab044805c9d7c47fef4844
-
SHA1
f3a2731e174a68d13b4ae15fab2d7b2788517039
-
SHA256
bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24
-
SHA512
c1a7bc64f9edf804ef7707dd717e7f8d293a607a96b9339e4acf2fdee1b70c643c1987016882620654c709795775042db9461da11cd4b1a016ea98fcd8e20a8c
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\schedule = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\exts\\hancom.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3176 set thread context of 2324 3176 rundll32.exe svchost.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXEpid process 1396 ipconfig.exe 1428 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1060 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 2324 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetasklist.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 2968 tasklist.exe Token: SeDebugPrivilege 1428 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.exesvchost.execmd.exedescription pid process target process PID 3716 wrote to memory of 3176 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 3176 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 3176 3716 rundll32.exe rundll32.exe PID 3176 wrote to memory of 1172 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 1172 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 1172 3176 rundll32.exe cmd.exe PID 1172 wrote to memory of 1060 1172 cmd.exe taskkill.exe PID 1172 wrote to memory of 1060 1172 cmd.exe taskkill.exe PID 1172 wrote to memory of 1060 1172 cmd.exe taskkill.exe PID 3176 wrote to memory of 728 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 728 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 728 3176 rundll32.exe cmd.exe PID 728 wrote to memory of 1396 728 cmd.exe ipconfig.exe PID 728 wrote to memory of 1396 728 cmd.exe ipconfig.exe PID 728 wrote to memory of 1396 728 cmd.exe ipconfig.exe PID 728 wrote to memory of 1392 728 cmd.exe ARP.EXE PID 728 wrote to memory of 1392 728 cmd.exe ARP.EXE PID 728 wrote to memory of 1392 728 cmd.exe ARP.EXE PID 3176 wrote to memory of 2840 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 2840 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 2840 3176 rundll32.exe cmd.exe PID 2840 wrote to memory of 1268 2840 cmd.exe systeminfo.exe PID 2840 wrote to memory of 1268 2840 cmd.exe systeminfo.exe PID 2840 wrote to memory of 1268 2840 cmd.exe systeminfo.exe PID 3176 wrote to memory of 1716 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 1716 3176 rundll32.exe cmd.exe PID 3176 wrote to memory of 1716 3176 rundll32.exe cmd.exe PID 1716 wrote to memory of 2968 1716 cmd.exe tasklist.exe PID 1716 wrote to memory of 2968 1716 cmd.exe tasklist.exe PID 1716 wrote to memory of 2968 1716 cmd.exe tasklist.exe PID 3176 wrote to memory of 2324 3176 rundll32.exe svchost.exe PID 3176 wrote to memory of 2324 3176 rundll32.exe svchost.exe PID 3176 wrote to memory of 2324 3176 rundll32.exe svchost.exe PID 3176 wrote to memory of 2324 3176 rundll32.exe svchost.exe PID 3176 wrote to memory of 2324 3176 rundll32.exe svchost.exe PID 2324 wrote to memory of 1244 2324 svchost.exe cmd.exe PID 2324 wrote to memory of 1244 2324 svchost.exe cmd.exe PID 2324 wrote to memory of 1244 2324 svchost.exe cmd.exe PID 1244 wrote to memory of 1428 1244 cmd.exe NETSTAT.EXE PID 1244 wrote to memory of 1428 1244 cmd.exe NETSTAT.EXE PID 1244 wrote to memory of 1428 1244 cmd.exe NETSTAT.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1396
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c netstat -a >> "C:\Users\Admin\AppData\Roaming\wininit.db"4⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -a5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bf2a29b5ef2fe2d2617964d3faa07140
SHA184b9027103b17a532568152710187c74dab2b40a
SHA256e34d453c791304be0c40e250b587b78e3f810858955c4f2a8b11203b014bd1cf
SHA512d82c87910f1c5e7de243c76d2d79d78cf598463f21ddd22e91d3ba0a8216b86f1ca8ff48ed9733e98343da8e0b593321ff0d704ed72e54e31d8b518c2e325d80
-
MD5
1a172b8163dcbd357e9fd93259032607
SHA19948761dd8f463e114c85e2840f99fdc5e7246e6
SHA2562021e0d1d7b988924df0b8edfff9610d11a18667e3b88f026d0e368dbd9c5d23
SHA512256fe7e847ff055ddc57cc711b370eccd294a84a956e4b3d88dc843645ae2a08f0f64cd0121b0a29f8ea2a2c255aedcc8de73fc00ca41cbe003fc5d4de307f19
-
MD5
fcc4b7198ccada4682a8f9ad3796b14f
SHA142088b205863baa690b59b09e9984da29bbf2bbf
SHA256ab501b83df9c8d4ac14047b0ae99f565711d3e1c1d617b0f644bb03d2e56ebd5
SHA5121ef5e0e4e3aafdea6e72374286b01ba50ff1649a272749d5f266d52ab523c77f0f71d93da42f61c55360460fec437fb431b8bc3986eeb3618086cabf8caed8e0