Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
0cc0aa5877cec9109b7a5a0e3a250c72.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0cc0aa5877cec9109b7a5a0e3a250c72.exe
Resource
win10v2004-20230221-en
General
-
Target
0cc0aa5877cec9109b7a5a0e3a250c72.exe
-
Size
513KB
-
MD5
0cc0aa5877cec9109b7a5a0e3a250c72
-
SHA1
1d49d462a11a00d8ac9608e49f055961bf79980d
-
SHA256
1324acd1f720055e7941b39949116dfe72ce2e7792e70128f69e228eb48b0821
-
SHA512
642b0d06755c78658c308167cf9e61a0e42bb792c61306c6f6976c5ebc51cbce1f795b534e4767e8106edc68bd58f16943c7acc0846cf1c67161c67c28746637
-
SSDEEP
12288:B/P+NYgHizBSWMJ/17sM57k0+iQkB86PGjg:BO6gH8UJ/mMWkBCg
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
resource yara_rule behavioral2/files/0x000a000000023162-136.dat golddragon_stage1 behavioral2/files/0x000a000000023162-137.dat golddragon_stage1 -
resource yara_rule behavioral2/memory/4608-149-0x0000000000610000-0x0000000000669000-memory.dmp golddragon_stage2 behavioral2/memory/4608-150-0x0000000000610000-0x0000000000669000-memory.dmp golddragon_stage2 behavioral2/memory/4608-151-0x0000000000610000-0x0000000000669000-memory.dmp golddragon_stage2 behavioral2/memory/4608-152-0x0000000000610000-0x0000000000669000-memory.dmp golddragon_stage2 behavioral2/memory/4608-153-0x0000000000610000-0x0000000000669000-memory.dmp golddragon_stage2 -
Loads dropped DLL 1 IoCs
pid Process 4428 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4428 set thread context of 4608 4428 rundll32.exe 106 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4496 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4260 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4916 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 544 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4608 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 544 taskkill.exe Token: SeDebugPrivilege 4496 tasklist.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4428 4356 0cc0aa5877cec9109b7a5a0e3a250c72.exe 83 PID 4356 wrote to memory of 4428 4356 0cc0aa5877cec9109b7a5a0e3a250c72.exe 83 PID 4356 wrote to memory of 4428 4356 0cc0aa5877cec9109b7a5a0e3a250c72.exe 83 PID 4428 wrote to memory of 2852 4428 rundll32.exe 84 PID 4428 wrote to memory of 2852 4428 rundll32.exe 84 PID 4428 wrote to memory of 2852 4428 rundll32.exe 84 PID 2852 wrote to memory of 544 2852 cmd.exe 86 PID 2852 wrote to memory of 544 2852 cmd.exe 86 PID 2852 wrote to memory of 544 2852 cmd.exe 86 PID 4428 wrote to memory of 4796 4428 rundll32.exe 92 PID 4428 wrote to memory of 4796 4428 rundll32.exe 92 PID 4428 wrote to memory of 4796 4428 rundll32.exe 92 PID 4796 wrote to memory of 4260 4796 cmd.exe 94 PID 4796 wrote to memory of 4260 4796 cmd.exe 94 PID 4796 wrote to memory of 4260 4796 cmd.exe 94 PID 4796 wrote to memory of 1832 4796 cmd.exe 95 PID 4796 wrote to memory of 1832 4796 cmd.exe 95 PID 4796 wrote to memory of 1832 4796 cmd.exe 95 PID 4428 wrote to memory of 460 4428 rundll32.exe 97 PID 4428 wrote to memory of 460 4428 rundll32.exe 97 PID 4428 wrote to memory of 460 4428 rundll32.exe 97 PID 460 wrote to memory of 4916 460 cmd.exe 100 PID 460 wrote to memory of 4916 460 cmd.exe 100 PID 460 wrote to memory of 4916 460 cmd.exe 100 PID 4428 wrote to memory of 412 4428 rundll32.exe 103 PID 4428 wrote to memory of 412 4428 rundll32.exe 103 PID 4428 wrote to memory of 412 4428 rundll32.exe 103 PID 412 wrote to memory of 4496 412 cmd.exe 105 PID 412 wrote to memory of 4496 412 cmd.exe 105 PID 412 wrote to memory of 4496 412 cmd.exe 105 PID 4428 wrote to memory of 4608 4428 rundll32.exe 106 PID 4428 wrote to memory of 4608 4428 rundll32.exe 106 PID 4428 wrote to memory of 4608 4428 rundll32.exe 106 PID 4428 wrote to memory of 4608 4428 rundll32.exe 106 PID 4428 wrote to memory of 4608 4428 rundll32.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc0aa5877cec9109b7a5a0e3a250c72.exe"C:\Users\Admin\AppData\Local\Temp\0cc0aa5877cec9109b7a5a0e3a250c72.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Cleaner~.tmp" Run2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:4260
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4608
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105.3MB
MD562c98a641aba1cb3cf79e575b2c981fd
SHA1d4cebe534c1a195afb58e8cf0927c496e9cb5847
SHA25611202d7879b31a257eb04ba49d93302b14d4089bac62d9669945c3e5a3b142a1
SHA5125b64c74459861cef876519d7667fa4defd18254f8db33a58ec52630e1fd631a5d70bd23b96ec95ec0468e5bd88ed73df16daaf03bf1e6b0a2d7b4a69a8d42341
-
Filesize
105.3MB
MD562c98a641aba1cb3cf79e575b2c981fd
SHA1d4cebe534c1a195afb58e8cf0927c496e9cb5847
SHA25611202d7879b31a257eb04ba49d93302b14d4089bac62d9669945c3e5a3b142a1
SHA5125b64c74459861cef876519d7667fa4defd18254f8db33a58ec52630e1fd631a5d70bd23b96ec95ec0468e5bd88ed73df16daaf03bf1e6b0a2d7b4a69a8d42341
-
Filesize
1KB
MD554ebef922125183d792a0ad055953cae
SHA17d2c122d8690f7162fe450ffdf1b1031f559d9ed
SHA2567d889d6d07c054abd0dae3bef79fe609830ddfb010a6e6729ea558b3abcf90fb
SHA5127a94ca60c05a752ff80bc08e1b6fb71a2661ec94d943fc6940bce997470cf9acf4207d3488efc1a02425d5a79ff40bc2e53512cba9433bd253b3c9c390c16b3d
-
Filesize
3KB
MD5a62cdc04ef7a22ba3d51541680cb112d
SHA1aab3979a7ce4aa6a5d10570ed22c6308c82bd115
SHA25639cf058edd39e8592f2c484e9e524b4972abdbcf63a0bee051f1e938970ab540
SHA512df250daaf4bf3251e8c7623875a2c72a0a7493054e0bbbfe8b93d7bec79bdab7b34e9ea8524eebb1394eb0a704b6d10ff8521db582861105431f69c5994fc182