Analysis

  • max time kernel
    99s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2023 01:30

General

  • Target

    1d30dfa5d8f21d1465409b207115ded6.dll

  • Size

    948KB

  • MD5

    1d30dfa5d8f21d1465409b207115ded6

  • SHA1

    942fd7b4ef1ccf7032a40acad975c7b5905c3c77

  • SHA256

    ed0161f2a3337af5e27a84bea85fb4abe35654f5de22bcb8a503d537952b1e8a

  • SHA512

    743b9e97336b07e3fde5511328488db212b1d7fac73152cef6253ddee1da3ee9764919eb2672caa0ffa258c79d37044f478afa6040d19ab822fc850e374fc646

  • SSDEEP

    12288:Xk39Tm0nUOM1rlFZs4pw60ev9cdPw7lu73ATUUyLafJVtnMB8UltPh:CHUOM1hFZlZ9YPeu73AA6Jbne80

Malware Config

Signatures

  • GoldDragon

    GoldDragon is a second-stage backdoor attributed to Kimsuky.

  • GoldDragon 2021 Stage1 backdoor 3 IoCs

    Detect GoldDragon backdoor Stage 1.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1d30dfa5d8f21d1465409b207115ded6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1d30dfa5d8f21d1465409b207115ded6.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im daumcleaner.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im daumcleaner.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3556
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:1464
        • C:\Windows\SysWOW64\ARP.EXE
          arp -a
          4⤵
            PID:3468
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            4⤵
            • Gathers system information
            PID:1852
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2456
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:4396
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c netstat -a >> "C:\Users\Admin\AppData\Roaming\wininit.db"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\Windows\SysWOW64\NETSTAT.EXE
              netstat -a
              5⤵
              • Gathers network information
              • Suspicious use of AdjustPrivilegeToken
              PID:1324

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat

      Filesize

      1KB

      MD5

      b7c4ba7016d48eb3d5abe1d0dbc657c6

      SHA1

      211c0eaad26c5a344588f8274d357f0d68518b0c

      SHA256

      4eb14ee88607b71c44bd1f2954e66a812430d714d1a69c78a9355e09869e9331

      SHA512

      ee5470e04c85e9e97e91cd2551035268b5b8139a6af0a89f5ffc204c0cdf11b866179afd6df030d9c7f4a2b258c1e0b0874e683394822b9ea32d47745bc86ad2

    • C:\Users\Admin\AppData\Roaming\Microsoft\pubs\PI_001.dat

      Filesize

      3KB

      MD5

      ade96cfcd404060e2e1202dbfdd2dbf3

      SHA1

      5b3cf3397f1fe9f6a80b42a46dd4cc8e6ca319c9

      SHA256

      52ea3585a49f51b152b9cd51e91fa1ae0e9bca3089fcbd3df589cee8a9fa3df4

      SHA512

      75f2ef9283c6e26794da136203cd78fb960acc7428a1a945d03de7435a4748f17495fa536fe041728ac1804022c560dbf2b22fc6d329ffa7ebca14e35fd917e6

    • C:\Users\Admin\AppData\Roaming\wininit.db

      Filesize

      4KB

      MD5

      66bdba3977fa47fd7281e9f28af1a45a

      SHA1

      efeaa5bd8b434bd377c3dd34a4ca8101487aae0f

      SHA256

      78bb7acf1cb08e0578f3101522d792f70561ee973c2d7c2690e477188ae6c31a

      SHA512

      0a8fb02cfe1c1663b77ee9f4bdb10709d26582ec231dd2da7a70c7fcb73d010be0adcfd90c10b2398af938d83add1e3e349e80f61fe8785d40399f6e0260ceec

    • memory/696-133-0x0000000010000000-0x00000000100F4000-memory.dmp

      Filesize

      976KB

    • memory/696-134-0x0000000010000000-0x00000000100F4000-memory.dmp

      Filesize

      976KB

    • memory/696-139-0x0000000010000000-0x00000000100F4000-memory.dmp

      Filesize

      976KB

    • memory/4396-147-0x0000000000390000-0x00000000003EA000-memory.dmp

      Filesize

      360KB

    • memory/4396-148-0x0000000000390000-0x00000000003EA000-memory.dmp

      Filesize

      360KB

    • memory/4396-149-0x0000000000390000-0x00000000003EA000-memory.dmp

      Filesize

      360KB

    • memory/4396-150-0x0000000000390000-0x00000000003EA000-memory.dmp

      Filesize

      360KB

    • memory/4396-151-0x0000000000390000-0x00000000003EA000-memory.dmp

      Filesize

      360KB