Analysis
-
max time kernel
4294183s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8.dll
Resource
win10v2004-en-20220113
General
-
Target
386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8.dll
-
Size
271KB
-
MD5
a49c43b4d6b5610e0719a3947b9ecf8f
-
SHA1
392883730fb2e9146a565a298d980632bde30650
-
SHA256
386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8
-
SHA512
3d9680fa03a1fee9e64904f4108517a8de3e37976490b04bc717ea1e5b23cfec89ab3fe295e61e24b6617a5a5b15564ffb598785b32828c89f1b3e92e5f525f0
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 1116 rundll32.exe 7 1116 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 desktop.exe -
resource yara_rule behavioral1/memory/1116-55-0x0000000074690000-0x0000000074794000-memory.dmp vmprotect -
Loads dropped DLL 1 IoCs
pid Process 1116 rundll32.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1072 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1984 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1116 rundll32.exe 1972 desktop.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 tasklist.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1468 wrote to memory of 1116 1468 rundll32.exe 27 PID 1116 wrote to memory of 956 1116 rundll32.exe 28 PID 1116 wrote to memory of 956 1116 rundll32.exe 28 PID 1116 wrote to memory of 956 1116 rundll32.exe 28 PID 1116 wrote to memory of 956 1116 rundll32.exe 28 PID 956 wrote to memory of 1984 956 cmd.exe 30 PID 956 wrote to memory of 1984 956 cmd.exe 30 PID 956 wrote to memory of 1984 956 cmd.exe 30 PID 956 wrote to memory of 1984 956 cmd.exe 30 PID 1116 wrote to memory of 2016 1116 rundll32.exe 31 PID 1116 wrote to memory of 2016 1116 rundll32.exe 31 PID 1116 wrote to memory of 2016 1116 rundll32.exe 31 PID 1116 wrote to memory of 2016 1116 rundll32.exe 31 PID 1116 wrote to memory of 824 1116 rundll32.exe 33 PID 1116 wrote to memory of 824 1116 rundll32.exe 33 PID 1116 wrote to memory of 824 1116 rundll32.exe 33 PID 1116 wrote to memory of 824 1116 rundll32.exe 33 PID 1116 wrote to memory of 1808 1116 rundll32.exe 35 PID 1116 wrote to memory of 1808 1116 rundll32.exe 35 PID 1116 wrote to memory of 1808 1116 rundll32.exe 35 PID 1116 wrote to memory of 1808 1116 rundll32.exe 35 PID 1808 wrote to memory of 1072 1808 cmd.exe 38 PID 1808 wrote to memory of 1072 1808 cmd.exe 38 PID 1808 wrote to memory of 1072 1808 cmd.exe 38 PID 1808 wrote to memory of 1072 1808 cmd.exe 38 PID 1116 wrote to memory of 1676 1116 rundll32.exe 41 PID 1116 wrote to memory of 1676 1116 rundll32.exe 41 PID 1116 wrote to memory of 1676 1116 rundll32.exe 41 PID 1116 wrote to memory of 1676 1116 rundll32.exe 41 PID 1116 wrote to memory of 280 1116 rundll32.exe 43 PID 1116 wrote to memory of 280 1116 rundll32.exe 43 PID 1116 wrote to memory of 280 1116 rundll32.exe 43 PID 1116 wrote to memory of 280 1116 rundll32.exe 43 PID 1116 wrote to memory of 2008 1116 rundll32.exe 45 PID 1116 wrote to memory of 2008 1116 rundll32.exe 45 PID 1116 wrote to memory of 2008 1116 rundll32.exe 45 PID 1116 wrote to memory of 2008 1116 rundll32.exe 45 PID 1116 wrote to memory of 1688 1116 rundll32.exe 47 PID 1116 wrote to memory of 1688 1116 rundll32.exe 47 PID 1116 wrote to memory of 1688 1116 rundll32.exe 47 PID 1116 wrote to memory of 1688 1116 rundll32.exe 47 PID 1116 wrote to memory of 1380 1116 rundll32.exe 49 PID 1116 wrote to memory of 1380 1116 rundll32.exe 49 PID 1116 wrote to memory of 1380 1116 rundll32.exe 49 PID 1116 wrote to memory of 1380 1116 rundll32.exe 49 PID 1116 wrote to memory of 588 1116 rundll32.exe 51 PID 1116 wrote to memory of 588 1116 rundll32.exe 51 PID 1116 wrote to memory of 588 1116 rundll32.exe 51 PID 1116 wrote to memory of 588 1116 rundll32.exe 51 PID 1116 wrote to memory of 1748 1116 rundll32.exe 53 PID 1116 wrote to memory of 1748 1116 rundll32.exe 53 PID 1116 wrote to memory of 1748 1116 rundll32.exe 53 PID 1116 wrote to memory of 1748 1116 rundll32.exe 53 PID 1116 wrote to memory of 1972 1116 rundll32.exe 57 PID 1116 wrote to memory of 1972 1116 rundll32.exe 57 PID 1116 wrote to memory of 1972 1116 rundll32.exe 57 PID 1116 wrote to memory of 1972 1116 rundll32.exe 57
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\386e23ec5e38c484f0b546b78e2480fc589f74f2233f3bcee060796f87f492d8.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >> "C:\Users\%USERNAME%\appdata\Roaming\info.ini"3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c dir "c:\program files" >> "C:\Users\%USERNAME%\appdata\Roaming\info.ini"3⤵PID:2016
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c dir "c:\program files (x86)" >> "C:\Users\%USERNAME%\appdata\Roaming\info.ini"3⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >> "C:\Users\%USERNAME%\appdata\Roaming\info.ini"3⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\11.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:1676
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\12.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:280
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\14.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\15.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:1688
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\16.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\17.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:588
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Office\18.0\Word\Security" /v VBAWarnings /t reg_dword /d 1 /f3⤵PID:1748
-
-
C:\Users\Admin\AppData\Roaming\desktop.exeC:\Users\Admin\AppData\Roaming\desktop.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-