Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 02:04
Static task
static1
Behavioral task
behavioral1
Sample
4f01950be1af645812ef894060589297.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f01950be1af645812ef894060589297.exe
Resource
win10v2004-20231215-en
General
-
Target
4f01950be1af645812ef894060589297.exe
-
Size
79KB
-
MD5
4f01950be1af645812ef894060589297
-
SHA1
6eb40d133e27baff5b907e561cfe44112b776dda
-
SHA256
51e8ac86d15128644d5a6432b41ec16d7ec6d6825852a1809f4f09369c0591b4
-
SHA512
ae5c95f718e9416fb0b477edfb6a6ff9a82b5506a8f757e33311432b55eaad1316268b7afe20da2e2b031c259c990cf93fc02ed1bc639060de25711822af4027
-
SSDEEP
1536:eoh4LbjnKc+QnPhkqV4Ca9Ia6IKIAYzNnQJFIsWNcdWAd249Cq/o:In84Ph1deI7LIpw7WAd2wC0o
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 4f01950be1af645812ef894060589297.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2768 4f01950be1af645812ef894060589297.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 4f01950be1af645812ef894060589297.exe