Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
goldropt5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
goldropt5.exe
Resource
win10v2004-20240426-en
General
-
Target
goldropt5.exe
-
Size
513KB
-
MD5
0cc0aa5877cec9109b7a5a0e3a250c72
-
SHA1
1d49d462a11a00d8ac9608e49f055961bf79980d
-
SHA256
1324acd1f720055e7941b39949116dfe72ce2e7792e70128f69e228eb48b0821
-
SHA512
642b0d06755c78658c308167cf9e61a0e42bb792c61306c6f6976c5ebc51cbce1f795b534e4767e8106edc68bd58f16943c7acc0846cf1c67161c67c28746637
-
SSDEEP
12288:B/P+NYgHizBSWMJ/17sM57k0+iQkB86PGjg:BO6gH8UJ/mMWkBCg
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
resource yara_rule behavioral1/memory/1648-21-0x0000000000150000-0x00000000001A9000-memory.dmp golddragon_stage2 behavioral1/memory/1648-20-0x0000000000150000-0x00000000001A9000-memory.dmp golddragon_stage2 behavioral1/memory/1648-22-0x0000000000150000-0x00000000001A9000-memory.dmp golddragon_stage2 behavioral1/memory/1648-23-0x0000000000150000-0x00000000001A9000-memory.dmp golddragon_stage2 -
Loads dropped DLL 1 IoCs
pid Process 2492 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2492 set thread context of 1648 2492 rundll32.exe 44 PID 1648 set thread context of 1892 1648 svchost.exe 47 PID 1648 set thread context of 1876 1648 svchost.exe 50 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2748 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2512 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2312 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 2688 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2688 taskkill.exe Token: SeDebugPrivilege 2748 tasklist.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2044 wrote to memory of 2492 2044 goldropt5.exe 28 PID 2492 wrote to memory of 2544 2492 rundll32.exe 29 PID 2492 wrote to memory of 2544 2492 rundll32.exe 29 PID 2492 wrote to memory of 2544 2492 rundll32.exe 29 PID 2492 wrote to memory of 2544 2492 rundll32.exe 29 PID 2544 wrote to memory of 2688 2544 cmd.exe 31 PID 2544 wrote to memory of 2688 2544 cmd.exe 31 PID 2544 wrote to memory of 2688 2544 cmd.exe 31 PID 2544 wrote to memory of 2688 2544 cmd.exe 31 PID 2492 wrote to memory of 2600 2492 rundll32.exe 33 PID 2492 wrote to memory of 2600 2492 rundll32.exe 33 PID 2492 wrote to memory of 2600 2492 rundll32.exe 33 PID 2492 wrote to memory of 2600 2492 rundll32.exe 33 PID 2600 wrote to memory of 2512 2600 cmd.exe 35 PID 2600 wrote to memory of 2512 2600 cmd.exe 35 PID 2600 wrote to memory of 2512 2600 cmd.exe 35 PID 2600 wrote to memory of 2512 2600 cmd.exe 35 PID 2600 wrote to memory of 2416 2600 cmd.exe 36 PID 2600 wrote to memory of 2416 2600 cmd.exe 36 PID 2600 wrote to memory of 2416 2600 cmd.exe 36 PID 2600 wrote to memory of 2416 2600 cmd.exe 36 PID 2492 wrote to memory of 2452 2492 rundll32.exe 37 PID 2492 wrote to memory of 2452 2492 rundll32.exe 37 PID 2492 wrote to memory of 2452 2492 rundll32.exe 37 PID 2492 wrote to memory of 2452 2492 rundll32.exe 37 PID 2452 wrote to memory of 2312 2452 cmd.exe 39 PID 2452 wrote to memory of 2312 2452 cmd.exe 39 PID 2452 wrote to memory of 2312 2452 cmd.exe 39 PID 2452 wrote to memory of 2312 2452 cmd.exe 39 PID 2492 wrote to memory of 2488 2492 rundll32.exe 41 PID 2492 wrote to memory of 2488 2492 rundll32.exe 41 PID 2492 wrote to memory of 2488 2492 rundll32.exe 41 PID 2492 wrote to memory of 2488 2492 rundll32.exe 41 PID 2488 wrote to memory of 2748 2488 cmd.exe 43 PID 2488 wrote to memory of 2748 2488 cmd.exe 43 PID 2488 wrote to memory of 2748 2488 cmd.exe 43 PID 2488 wrote to memory of 2748 2488 cmd.exe 43 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 2492 wrote to memory of 1648 2492 rundll32.exe 44 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1892 1648 svchost.exe 47 PID 1648 wrote to memory of 1876 1648 svchost.exe 50 PID 1648 wrote to memory of 1876 1648 svchost.exe 50 PID 1648 wrote to memory of 1876 1648 svchost.exe 50 PID 1648 wrote to memory of 1876 1648 svchost.exe 50 PID 1648 wrote to memory of 1876 1648 svchost.exe 50 PID 1648 wrote to memory of 1876 1648 svchost.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\goldropt5.exe"C:\Users\Admin\AppData\Local\Temp\goldropt5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Cleaner~.tmp" Run2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2512
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:1892
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:1876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510ebe703743552a0fb54af8b9f3b01d
SHA1b449fdf2d0b0d139ff65a8d81770d1c65f6b318b
SHA2564064a3bd9bb9b84bb68a20cf7028be8126f9790c1c353a12314c5a399b408304
SHA51237a9b1a37157b47b7def76171e3053d820a8d3c940d7e8e9806ea44d5befcfd92658a59f3b4e540161cdc4bbb0f845f5729d175c9070b1cb7c9b44b5d8708bde
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
1.2MB
MD5f8ae7546fc9ccd58241bd85b7740b9fd
SHA175581e8b1e8c86c179470b64de55468c742a5762
SHA256bdc1401e30a7dc4e1b1071c6b5a6ee6dfd384f66e105139379f472eccc51f087
SHA51281daf67283f73788f657bb19a75f5634927616e69cb0cf03faf5590a85dc617fd7c56a1a673f8f11a9c8240f44f1f545d56ab33a39bb7d696bf6582b64e0e706
-
Filesize
1KB
MD5c45af9f998a2fb70722fd9c5faacd04f
SHA1e283a1495a9b62c11b74003c557b845b9bdefdd2
SHA256fe2fdd6b7bda4f7204b2ab5d7e3011818184a54e748c9838d09b2484f8744dec
SHA512c8e9979adb955deef5ba02ef88ffe1778e087bb7623e9d6e2bc118ca899e9941875e846132c814a5104986e33f204e13aeaa14e36512b2ff54dd9ecf1b523f19
-
Filesize
3KB
MD5a93a369ca9c318fa0c3a2a701ab978da
SHA1e2c0c769f054b2456e5ee52fc3ac2678347963bd
SHA2567ca242e7ba97d961c1ee0f27def3e1ca32124fbf7f09d86f6b447aa48c25b53a
SHA5128411d78773824b9fa47b31237739d81a22bf578363d0b0f2740da1d25a78f3d60e53e68db12660d335bb1f542e6c78d60a78f7a94aa27cf1216a9f0050cd1e8e
-
Filesize
6KB
MD5abd1a0bb5bbbe513d5abe61b3813ff75
SHA114127be62e0dccd389019d63595e9579a523ca63
SHA2568457e7680135989a7f875193fc8ea0ab34c10759059d9ec8f7eba0d01fc9fd87
SHA512f44a2bec71cb853c6e115f5ac0f81e544f83df8195bee77789982698f39c32cb9d0b3e830bc28114ecebee3cb62a37fdad8e84feb75586e6bc18d4cb9dcd7ef9
-
Filesize
107KB
MD53633a0150b6f2579f4155a49aa617728
SHA14a6bca80fe928e77538706dd6d2f79224511825d
SHA256da3124007391c833d4b1dd676b33059c0dc6ac266500060a798c038fb574da72
SHA512b5ea1cce785d880b4cf158b5f6f3ed8b102592609fc3e1358b31dc322e54918387f1dca5debbf8c6fd886edc610da7a7c12d52ee9da24e4accc3b8d50bb78611