Analysis
-
max time kernel
99s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 01:30
Behavioral task
behavioral1
Sample
1d30dfa5d8f21d1465409b207115ded6.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d30dfa5d8f21d1465409b207115ded6.dll
Resource
win10v2004-20230220-en
General
-
Target
1d30dfa5d8f21d1465409b207115ded6.dll
-
Size
948KB
-
MD5
1d30dfa5d8f21d1465409b207115ded6
-
SHA1
942fd7b4ef1ccf7032a40acad975c7b5905c3c77
-
SHA256
ed0161f2a3337af5e27a84bea85fb4abe35654f5de22bcb8a503d537952b1e8a
-
SHA512
743b9e97336b07e3fde5511328488db212b1d7fac73152cef6253ddee1da3ee9764919eb2672caa0ffa258c79d37044f478afa6040d19ab822fc850e374fc646
-
SSDEEP
12288:Xk39Tm0nUOM1rlFZs4pw60ev9cdPw7lu73ATUUyLafJVtnMB8UltPh:CHUOM1hFZlZ9YPeu73AA6Jbne80
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
resource yara_rule behavioral2/memory/696-133-0x0000000010000000-0x00000000100F4000-memory.dmp golddragon_stage1 behavioral2/memory/696-134-0x0000000010000000-0x00000000100F4000-memory.dmp golddragon_stage1 behavioral2/memory/696-139-0x0000000010000000-0x00000000100F4000-memory.dmp golddragon_stage1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\schedule = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\exts\\hmmapi.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 4396 696 rundll32.exe 105 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2456 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1464 ipconfig.exe 1324 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1852 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 3556 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4396 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 2456 tasklist.exe Token: SeDebugPrivilege 1324 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4380 wrote to memory of 696 4380 rundll32.exe 83 PID 4380 wrote to memory of 696 4380 rundll32.exe 83 PID 4380 wrote to memory of 696 4380 rundll32.exe 83 PID 696 wrote to memory of 832 696 rundll32.exe 84 PID 696 wrote to memory of 832 696 rundll32.exe 84 PID 696 wrote to memory of 832 696 rundll32.exe 84 PID 832 wrote to memory of 3556 832 cmd.exe 86 PID 832 wrote to memory of 3556 832 cmd.exe 86 PID 832 wrote to memory of 3556 832 cmd.exe 86 PID 696 wrote to memory of 5100 696 rundll32.exe 93 PID 696 wrote to memory of 5100 696 rundll32.exe 93 PID 696 wrote to memory of 5100 696 rundll32.exe 93 PID 5100 wrote to memory of 1464 5100 cmd.exe 95 PID 5100 wrote to memory of 1464 5100 cmd.exe 95 PID 5100 wrote to memory of 1464 5100 cmd.exe 95 PID 5100 wrote to memory of 3468 5100 cmd.exe 96 PID 5100 wrote to memory of 3468 5100 cmd.exe 96 PID 5100 wrote to memory of 3468 5100 cmd.exe 96 PID 696 wrote to memory of 4344 696 rundll32.exe 97 PID 696 wrote to memory of 4344 696 rundll32.exe 97 PID 696 wrote to memory of 4344 696 rundll32.exe 97 PID 4344 wrote to memory of 1852 4344 cmd.exe 99 PID 4344 wrote to memory of 1852 4344 cmd.exe 99 PID 4344 wrote to memory of 1852 4344 cmd.exe 99 PID 696 wrote to memory of 428 696 rundll32.exe 102 PID 696 wrote to memory of 428 696 rundll32.exe 102 PID 696 wrote to memory of 428 696 rundll32.exe 102 PID 428 wrote to memory of 2456 428 cmd.exe 104 PID 428 wrote to memory of 2456 428 cmd.exe 104 PID 428 wrote to memory of 2456 428 cmd.exe 104 PID 696 wrote to memory of 4396 696 rundll32.exe 105 PID 696 wrote to memory of 4396 696 rundll32.exe 105 PID 696 wrote to memory of 4396 696 rundll32.exe 105 PID 696 wrote to memory of 4396 696 rundll32.exe 105 PID 696 wrote to memory of 4396 696 rundll32.exe 105 PID 4396 wrote to memory of 884 4396 svchost.exe 106 PID 4396 wrote to memory of 884 4396 svchost.exe 106 PID 4396 wrote to memory of 884 4396 svchost.exe 106 PID 884 wrote to memory of 1324 884 cmd.exe 108 PID 884 wrote to memory of 1324 884 cmd.exe 108 PID 884 wrote to memory of 1324 884 cmd.exe 108
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d30dfa5d8f21d1465409b207115ded6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d30dfa5d8f21d1465409b207115ded6.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1464
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.execmd /c netstat -a >> "C:\Users\Admin\AppData\Roaming\wininit.db"4⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -a5⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b7c4ba7016d48eb3d5abe1d0dbc657c6
SHA1211c0eaad26c5a344588f8274d357f0d68518b0c
SHA2564eb14ee88607b71c44bd1f2954e66a812430d714d1a69c78a9355e09869e9331
SHA512ee5470e04c85e9e97e91cd2551035268b5b8139a6af0a89f5ffc204c0cdf11b866179afd6df030d9c7f4a2b258c1e0b0874e683394822b9ea32d47745bc86ad2
-
Filesize
3KB
MD5ade96cfcd404060e2e1202dbfdd2dbf3
SHA15b3cf3397f1fe9f6a80b42a46dd4cc8e6ca319c9
SHA25652ea3585a49f51b152b9cd51e91fa1ae0e9bca3089fcbd3df589cee8a9fa3df4
SHA51275f2ef9283c6e26794da136203cd78fb960acc7428a1a945d03de7435a4748f17495fa536fe041728ac1804022c560dbf2b22fc6d329ffa7ebca14e35fd917e6
-
Filesize
4KB
MD566bdba3977fa47fd7281e9f28af1a45a
SHA1efeaa5bd8b434bd377c3dd34a4ca8101487aae0f
SHA25678bb7acf1cb08e0578f3101522d792f70561ee973c2d7c2690e477188ae6c31a
SHA5120a8fb02cfe1c1663b77ee9f4bdb10709d26582ec231dd2da7a70c7fcb73d010be0adcfd90c10b2398af938d83add1e3e349e80f61fe8785d40399f6e0260ceec