Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    12-01-2022 17:52

General

  • Target

    bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll

  • Size

    366KB

  • MD5

    e69294040dab044805c9d7c47fef4844

  • SHA1

    f3a2731e174a68d13b4ae15fab2d7b2788517039

  • SHA256

    bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24

  • SHA512

    c1a7bc64f9edf804ef7707dd717e7f8d293a607a96b9339e4acf2fdee1b70c643c1987016882620654c709795775042db9461da11cd4b1a016ea98fcd8e20a8c

Malware Config

Signatures

  • GoldDragon

    GoldDragon is a second-stage backdoor attributed to Kimsuky.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb0a3c784e55bd25f845644b69c57e3e470af51983617fdfe7ba5d253019ed24.bin.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im daumcleaner.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im daumcleaner.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1060
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:1396
        • C:\Windows\SysWOW64\ARP.EXE
          arp -a
          4⤵
            PID:1392
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            4⤵
            • Gathers system information
            PID:1268
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2968
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c netstat -a >> "C:\Users\Admin\AppData\Roaming\wininit.db"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1244
            • C:\Windows\SysWOW64\NETSTAT.EXE
              netstat -a
              5⤵
              • Gathers network information
              • Suspicious use of AdjustPrivilegeToken
              PID:1428

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat

      MD5

      bf2a29b5ef2fe2d2617964d3faa07140

      SHA1

      84b9027103b17a532568152710187c74dab2b40a

      SHA256

      e34d453c791304be0c40e250b587b78e3f810858955c4f2a8b11203b014bd1cf

      SHA512

      d82c87910f1c5e7de243c76d2d79d78cf598463f21ddd22e91d3ba0a8216b86f1ca8ff48ed9733e98343da8e0b593321ff0d704ed72e54e31d8b518c2e325d80

    • C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat

      MD5

      1a172b8163dcbd357e9fd93259032607

      SHA1

      9948761dd8f463e114c85e2840f99fdc5e7246e6

      SHA256

      2021e0d1d7b988924df0b8edfff9610d11a18667e3b88f026d0e368dbd9c5d23

      SHA512

      256fe7e847ff055ddc57cc711b370eccd294a84a956e4b3d88dc843645ae2a08f0f64cd0121b0a29f8ea2a2c255aedcc8de73fc00ca41cbe003fc5d4de307f19

    • C:\Users\Admin\AppData\Roaming\wininit.db

      MD5

      fcc4b7198ccada4682a8f9ad3796b14f

      SHA1

      42088b205863baa690b59b09e9984da29bbf2bbf

      SHA256

      ab501b83df9c8d4ac14047b0ae99f565711d3e1c1d617b0f644bb03d2e56ebd5

      SHA512

      1ef5e0e4e3aafdea6e72374286b01ba50ff1649a272749d5f266d52ab523c77f0f71d93da42f61c55360460fec437fb431b8bc3986eeb3618086cabf8caed8e0

    • memory/728-121-0x0000000000000000-mapping.dmp

    • memory/1060-120-0x0000000000000000-mapping.dmp

    • memory/1172-119-0x0000000000000000-mapping.dmp

    • memory/1244-133-0x0000000000000000-mapping.dmp

    • memory/1268-126-0x0000000000000000-mapping.dmp

    • memory/1392-123-0x0000000000000000-mapping.dmp

    • memory/1396-122-0x0000000000000000-mapping.dmp

    • memory/1428-134-0x0000000000000000-mapping.dmp

    • memory/1716-127-0x0000000000000000-mapping.dmp

    • memory/2324-130-0x0000000002400000-0x000000000245A000-memory.dmp

      Filesize

      360KB

    • memory/2324-131-0x000000000240D527-mapping.dmp

    • memory/2324-132-0x0000000002400000-0x000000000245A000-memory.dmp

      Filesize

      360KB

    • memory/2840-124-0x0000000000000000-mapping.dmp

    • memory/2968-129-0x0000000000000000-mapping.dmp

    • memory/3176-118-0x0000000000000000-mapping.dmp