Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 06:00
Static task
static1
Behavioral task
behavioral1
Sample
111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d.dll
Resource
win10-en-20211208
General
-
Target
111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d.dll
-
Size
107KB
-
MD5
42b9f65fda3cbb613f726c9a4f26069e
-
SHA1
71f337dc65459027f4ab26198270368f68d7ae77
-
SHA256
111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d
-
SHA512
7535e699bf635c87523e014eee62dae61f3545e908ef23e864635f0c39b115a55c2ce87ba120123d82739070a63de3adbdfbd9153c973260e6cfcd15da31fbb2
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 5 1624 rundll32.exe 6 1624 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1624 rundll32.exe 1624 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 1624 rundll32.exe Token: SeDebugPrivilege 1624 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1624 1744 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-