Analysis
-
max time kernel
447s -
max time network
455s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 15:09
Behavioral task
behavioral1
Sample
payload.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
payload.dll
Resource
win10v2004-20240508-en
General
-
Target
payload.dll
-
Size
481KB
-
MD5
e647b3366dc836c1f63bdc5ba2aef3a9
-
SHA1
a7b0711b45081768817e85d6fc76e23093093f87
-
SHA256
3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5
-
SHA512
39166d31017b238b4cae861ab263e3dd11260c0203fc8dcfd41461f3b850126ba954bcf9fb7678ceb63dc2e2f252bd6e20f7f33aed1a81db8c0d89c56be5dfcb
-
SSDEEP
12288:L5VaR+IeIcFHazhjpniikvx4/qs6iDwEHtDWT:L5SjcFyhjp0x4/qs6VEt
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Processes:
resource yara_rule behavioral2/memory/3092-12-0x00000000004F0000-0x0000000000549000-memory.dmp golddragon_stage2 behavioral2/memory/3092-13-0x00000000004F0000-0x0000000000549000-memory.dmp golddragon_stage2 behavioral2/memory/3092-14-0x00000000004F0000-0x0000000000549000-memory.dmp golddragon_stage2 behavioral2/memory/3092-15-0x00000000004F0000-0x0000000000549000-memory.dmp golddragon_stage2 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dropbox = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\OneDriver\\down\\OneDrivecache.dll\" Run" rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rundll32.exesvchost.exedescription pid process target process PID 1420 set thread context of 3092 1420 rundll32.exe svchost.exe PID 3092 set thread context of 1920 3092 svchost.exe iexplore.exe PID 3092 set thread context of 1592 3092 svchost.exe iexplore.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3392 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3452 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
svchost.exepid process 3092 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetasklist.exedescription pid process Token: SeDebugPrivilege 3452 taskkill.exe Token: SeDebugPrivilege 4992 tasklist.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
rundll32.exerundll32.execmd.execmd.execmd.execmd.exesvchost.exedescription pid process target process PID 4976 wrote to memory of 1420 4976 rundll32.exe rundll32.exe PID 4976 wrote to memory of 1420 4976 rundll32.exe rundll32.exe PID 4976 wrote to memory of 1420 4976 rundll32.exe rundll32.exe PID 1420 wrote to memory of 3680 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 3680 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 3680 1420 rundll32.exe cmd.exe PID 3680 wrote to memory of 3452 3680 cmd.exe taskkill.exe PID 3680 wrote to memory of 3452 3680 cmd.exe taskkill.exe PID 3680 wrote to memory of 3452 3680 cmd.exe taskkill.exe PID 1420 wrote to memory of 2976 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 2976 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 2976 1420 rundll32.exe cmd.exe PID 2976 wrote to memory of 3392 2976 cmd.exe ipconfig.exe PID 2976 wrote to memory of 3392 2976 cmd.exe ipconfig.exe PID 2976 wrote to memory of 3392 2976 cmd.exe ipconfig.exe PID 2976 wrote to memory of 2440 2976 cmd.exe ARP.EXE PID 2976 wrote to memory of 2440 2976 cmd.exe ARP.EXE PID 2976 wrote to memory of 2440 2976 cmd.exe ARP.EXE PID 1420 wrote to memory of 1468 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 1468 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 1468 1420 rundll32.exe cmd.exe PID 1468 wrote to memory of 912 1468 cmd.exe systeminfo.exe PID 1468 wrote to memory of 912 1468 cmd.exe systeminfo.exe PID 1468 wrote to memory of 912 1468 cmd.exe systeminfo.exe PID 1420 wrote to memory of 5112 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 5112 1420 rundll32.exe cmd.exe PID 1420 wrote to memory of 5112 1420 rundll32.exe cmd.exe PID 5112 wrote to memory of 4992 5112 cmd.exe tasklist.exe PID 5112 wrote to memory of 4992 5112 cmd.exe tasklist.exe PID 5112 wrote to memory of 4992 5112 cmd.exe tasklist.exe PID 1420 wrote to memory of 3092 1420 rundll32.exe svchost.exe PID 1420 wrote to memory of 3092 1420 rundll32.exe svchost.exe PID 1420 wrote to memory of 3092 1420 rundll32.exe svchost.exe PID 1420 wrote to memory of 3092 1420 rundll32.exe svchost.exe PID 1420 wrote to memory of 3092 1420 rundll32.exe svchost.exe PID 3092 wrote to memory of 1920 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1920 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1920 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1920 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1920 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1592 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1592 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1592 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1592 3092 svchost.exe iexplore.exe PID 3092 wrote to memory of 1592 3092 svchost.exe iexplore.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\payload.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\payload.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im daumcleaner.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im daumcleaner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3392
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"3⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:1920
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\250291F3FA7935E360EA9925CBAB58AC_127BFD1DDEBEBF233C3AB01551311C82
Filesize471B
MD5f51e1ebd6e4c47e4191ca1c8b0a4ce08
SHA12cb4c357095ea9da245922ec7503a1a5beaca718
SHA25688a22f5c7b5b1e21fdbdc1c7ff38b5fbc0fa0b0d7ba66d3ce5607f7f3c82bd03
SHA512dbdf3394e659f35650d96c0d6a28a8cbde6d4dbbd7b1d1b6f0140bd342d420fe183c082a246df5fa309d9d53c9485fe0b83c45ef9f587bbf9b938a63473320ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\250291F3FA7935E360EA9925CBAB58AC_96B3BEC0DEC2F2E522B271032F313D00
Filesize471B
MD550b0a73f95f29b07ecdda0eb240059c1
SHA1c7214d176038595d39d613de21d5aaddfc7ceb15
SHA256af41d79c3ab7d7882af9cd898098bf7412b40e1e14c76f4cb0e44ca9fe0df3ef
SHA5126b93f5eb5d1d8bc85e6bb18fd4b17f3d5ca5ed1e83903009384748b012589029cc09f4d2cc07212e0f90fd75faafd10998b1934c87e1b3bfd018447ac9389100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_44B7CEC7D7846BA12D21890D7AF2D759
Filesize471B
MD5a4b87abbd6c62f68e56ba308b57b8ae8
SHA1837de872421bdc8c3925cfdac5a9e19865af0fba
SHA256b85e10ccf5b1120fcecc3106240395f48527473d967d6ba8c99a4e6edb45d4fb
SHA51255d2c39bb1dc19d32d1cc86ecfc23bfb2345114730112584792fe28bda0ac9e05565db1fe3666cbe197c34d08c011860c2af4ba42eccccce7d4def3005a00554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DCD0D75871DDE826855F6AE0FFC4CA06_0DA877C2E9640F0817DE9740E60CBA04
Filesize471B
MD5f90ed4a56224d1288e2bf9872e56d969
SHA1f05a98f0b920570b775447e3225369e60eefee1f
SHA256eafd822a22365c101f4d9825f7023a1b1098e4399681cc88afb6cf01a412320f
SHA512e6621356475a9e6e7cd1ecb4863aff8f148a7c77e6a0888e80316e6240d0bc34f35e5637b8b18b5601474534500ffcd63b319366efba694510a335012410e99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_427CDB1C9AAC2BAE6B426DB11F126FA2
Filesize471B
MD5495d0cebc4f7c5d9fa682b287c948a77
SHA123c538c326f4b4af730c148d2c13cc8d64dafb41
SHA25694bed1fc23b4eab2efa939140063e3d70f6a87bf48cb4583eb60f1498e9d8a98
SHA512caa7ae881bad2ae1a515db060f384c91aaaec62e9b929e2f362763537169115e8cbd300febd199636352551f60657ffa62399ac12fcb8789a627acaf4e21710f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\250291F3FA7935E360EA9925CBAB58AC_127BFD1DDEBEBF233C3AB01551311C82
Filesize404B
MD542fa37717edbc463ed72b96c984ee42a
SHA1e17649374b604a060b198a57126e9ac0971c02dc
SHA25649542450f9bff0245584378fef320a52dc75ac831d5bcfa2661c444f0d62c68e
SHA51201fc67f33b9b7c2c81d9e0e9eda2ec5f502c446968303dead2577540ce631dadf22b5b2409c88abe1c66b3d8bbdf4a7a7db045080e0928a877b87770bea02a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\250291F3FA7935E360EA9925CBAB58AC_96B3BEC0DEC2F2E522B271032F313D00
Filesize400B
MD547b461034e8971b5fd2f88a5a11d00bd
SHA18eff6feb5829b4438d5f9096b909124fa70fdd72
SHA256e27c41114525a10b854a69b4a302062ff5ff43356d626760fa10064f06cade32
SHA5122b14a0d5835465e6f41fdd322503b72191d47bc0c4339438c012ffb3284c8de6e505094fb2beeb1b6b53f379bcad1d4512938decd1eeb865cacdc2cbcfcb5da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_44B7CEC7D7846BA12D21890D7AF2D759
Filesize416B
MD501aa8cc28c914d8a539b52d7f8ce0949
SHA193847afe186ba6a02a66fc42426ca14889cc2ed8
SHA256b2391d19ffab7ce2452c48b1eb950ba6d5ec92fe6125c6efdf39a7212f4927a0
SHA5128d487ae0827f967904be8e74929a95885074855a51dddf433ac58a141445d3f42e1ac41fcd7d33ff774e6a2224c7d9aa104be22d74e9624c782bd068bb390fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DCD0D75871DDE826855F6AE0FFC4CA06_0DA877C2E9640F0817DE9740E60CBA04
Filesize396B
MD57215fb876469bb21f40692d3bd2e5152
SHA18f81ee9b30e06c3096ab30148dfdb0ee081068f8
SHA2560a840737be904f72645c6daa1f2112830faf90611301256d79352932737c06dc
SHA512387b3d25623493aae40d4cb6195ea0e58668ec22c6a62a870edafa13dcb4f4e607a91bfe2a077526e8861735099357d09a5dc428396d6425302fae40aa2c96b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_427CDB1C9AAC2BAE6B426DB11F126FA2
Filesize416B
MD555e20522620ccc91018d5670d54c6bc7
SHA102c57e753e6e89bbb12ee4ddd4f1220c6f5f9160
SHA256c2e6f2377b231f454107aa3e383ae051d267b06bc5d2fdc781d0cf536b114092
SHA5122427bca11e991221a1e44ad738b57de969f9ffecef92dc933a7c34d9ecfd0d3380950bd4e4f792e46ba97b4db78266a77f8cfd6bf362dc032962b8aac470a969
-
Filesize
122B
MD55eac7aa3a6a82868ce0f3f2f457a155f
SHA1b9e602fc7fd5f3628ebb2b413b92816f8b62e108
SHA256e6275c05155792429be975c2f8ea368df9e7976b6bbadf54764ad18c944deaa6
SHA5124a59c6f521d02cb723ec20ed1718ac3dc918edbab05b5704a74e8997a8abba8ea1a9400511e06a4acb258dd96b249d84fc8aa2a612158bdf89523a9b31e57af6
-
Filesize
1KB
MD5698e337fd6c70417047e311ab31eb1b8
SHA16be8796c2aed800f78af65c3a69cfe2b4b659bfa
SHA256e7201b3c36c52e5af3a295033d11381b4c4a7b5c4ef15c697360bdc1d38a8682
SHA51229276f0174ee877a49beec2e1c45920736b4a0abd33364eb8d11f71e5a8487f596cc3b04291c36395a218480895b67b60c368c0b2137ece32d154d55d14963a0
-
Filesize
1KB
MD5585f0120d8a23dcc7dac65b9c2e66264
SHA1ed35de5493712d09d4666ac3ed627b9325736364
SHA25620a9a058a1f68aa4bb0adf18a59749e5ae624695615d463fe023b86dde26c613
SHA512ee538309543a31c3479680a4576be39a3a15d7471ba3257fe97ae5f8ff9ec9edcde945752ec7bddbc886fcdb45b0f2371a2c0c101f59f2b2f205ce56d6acff55
-
Filesize
4KB
MD51a3e54053f9675cbba96383893cb6ce2
SHA18b6cdd0640374d000c4dfb96c5d857a955221956
SHA256bb7ce2a873a42dfa4c8d7c13da1622997021d3d1b708c964377ca5a722275042
SHA512f991ea3e5e85a4f7d025849cc95a6161f1a6ede9e0a1bd3d00cc4d1201bd9ecd3875e18e5fe80944af1b7a9741f0941ba2fdd96f6b6a80df46df3895db9c0200
-
Filesize
1KB
MD5a073457540ea1c9b2154659a1bfa5aa5
SHA12d753d17615fec3e48dd9867281589bfecfb8450
SHA256b952e60534d320ef7d804a94a0ffed865162f3b205f7f133dcc83aabe5cccaf8
SHA5126b02a4a9655b8b927226e5f3e04a85d39af13268b02c78b38149ecbb60401958d827e49209ad0b5cde368cd2533fdc742bd2c493b68f4f2babe39da0c4b33a42
-
Filesize
1KB
MD5e9fa26963d09470edd1eb99e08192836
SHA19ffc9936bca4cfb7c771a5101a2fadea134b63c4
SHA2565e1e5caf5f5711f433058eb2db5a9458a7f79d6d2f5064ab0f40b6dbfa53e626
SHA512b5cc981a7b767372be53422a32548577836c2d4daa8947810917badea388ba36e2f1c3287be7b14e0bac1f80dcfde9510660f2203234c8ab494b27d416f9d86b
-
Filesize
4KB
MD5caf8e687517e158ebb535556590c13ec
SHA1cd3701f7bb2b277573d5906b1172ae80a1e481ab
SHA256c8477bdc13781bbbb50015827ee53aef18a4145a42fc5143e6e03ea441c58171
SHA512437a85ee016c47f5dbe3945a1cf054f46d01d950a2271d889581e4a3ea4b31432fe5a23be13df53a1fbda16c05ee662363a6d1be70b913f6d5ef6d0a96acf9f6
-
Filesize
3.9MB
MD5510024164bed9de12d37e886ff3c1dda
SHA148c29e186dce17a18ed8809594c81d67959c869e
SHA2566b5c4ff9a859eb44dc50ab1af2b7aeb3fd2468e7561529737202d86db97b1dc9
SHA512f24254a6e1fc44d9f727413f02a2dcfe40461579cf1e333ad2d0b0a0a82cb07a9e06e1abb474e44b262e3551760fe954bd6c3d9dd494c8a71720b48d8eaf9007
-
Filesize
3KB
MD5bcddec6cbeffac989482570f1de3e570
SHA1b8e0aa5f66c05be112ad4dfbab8c7435d22fbcf9
SHA2567606c1f7f0f0278751c2a23f42b53a2e0f5b56517b5d1fea61a4d9d3943c2afd
SHA512c8eb01ff5e988b38e79fc46bf74dde1bca10950f5fd95822d1236fe7c4c6c31c29593476639e0d34f92bc6b2df87a47b911fde5b1b8e053f032a3f0dd4370084
-
Filesize
10KB
MD503149db297b2e4f839988c98b384c257
SHA1408edda2683378d78eb9ef12245dd1c58cbc9620
SHA2567ae691c28724612a4402baacffb6be2a2ad5dc199ef08e603633e9682ce5bb72
SHA51262eea5098a9f7bbee65aedad8aa1fd5fe624774126d512632801f7745b9be6d8ff6efe63305b4613ed525b85ab63518842fc7bbf5bdd808275a75da76a396c18
-
Filesize
1KB
MD53ac23042858a9e84c565cfe31bb2ed5e
SHA10942ee1dbe2339cf05845a5b2a42d8f1e828a664
SHA25690ae3732ff5b45dc2af06e4bd7e2c75d336ec36a8dc2efd6b2867a3e2ffdbd05
SHA5124bdf18cd2924f30044bb6cc380312a50aa09d979b3afea1b2c8626b258e110226e62d1df02d27d338b87b2b66a3714990f48d732280f2703465c9c3f47174c3d
-
Filesize
269KB
MD57a744f63e4debed1731d8f3e0d359bcb
SHA13a545d12f62282cb52d7bb6278a3933ce7f1e044
SHA256366ad650c71b2948e00b607dfb1f34cbeb408895b913f042da4353baf8a2dcae
SHA512ede167374b445d504e54887124ffb6449f44f09d1756f63e135cbfcf1308b078acd76073836888c2ef890de5779d3c4b39525c079195f89e765c3ccb9f78d283