Analysis

  • max time kernel
    447s
  • max time network
    455s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 15:09

General

  • Target

    payload.dll

  • Size

    481KB

  • MD5

    e647b3366dc836c1f63bdc5ba2aef3a9

  • SHA1

    a7b0711b45081768817e85d6fc76e23093093f87

  • SHA256

    3903958eb28632aa58e455eb87482d1ccef38a6fe43512baad30902e8bfdd6d5

  • SHA512

    39166d31017b238b4cae861ab263e3dd11260c0203fc8dcfd41461f3b850126ba954bcf9fb7678ceb63dc2e2f252bd6e20f7f33aed1a81db8c0d89c56be5dfcb

  • SSDEEP

    12288:L5VaR+IeIcFHazhjpniikvx4/qs6iDwEHtDWT:L5SjcFyhjp0x4/qs6VEt

Malware Config

Signatures

  • GoldDragon

    GoldDragon is a second-stage backdoor attributed to Kimsuky.

  • GoldDragon 2021 Stage2 infostealer 4 IoCs

    Detect GoldDragon InfoStealer Stage 2.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\payload.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\payload.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im daumcleaner.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im daumcleaner.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ipconfig/all >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat" & arp -a >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:3392
        • C:\Windows\SysWOW64\ARP.EXE
          arp -a
          4⤵
            PID:2440
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c systeminfo >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            4⤵
            • Gathers system information
            PID:912
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c tasklist >>"C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5112
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4992
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:3092
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            4⤵
              PID:1920
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              4⤵
                PID:1592

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\250291F3FA7935E360EA9925CBAB58AC_127BFD1DDEBEBF233C3AB01551311C82

          Filesize

          471B

          MD5

          f51e1ebd6e4c47e4191ca1c8b0a4ce08

          SHA1

          2cb4c357095ea9da245922ec7503a1a5beaca718

          SHA256

          88a22f5c7b5b1e21fdbdc1c7ff38b5fbc0fa0b0d7ba66d3ce5607f7f3c82bd03

          SHA512

          dbdf3394e659f35650d96c0d6a28a8cbde6d4dbbd7b1d1b6f0140bd342d420fe183c082a246df5fa309d9d53c9485fe0b83c45ef9f587bbf9b938a63473320ff

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\250291F3FA7935E360EA9925CBAB58AC_96B3BEC0DEC2F2E522B271032F313D00

          Filesize

          471B

          MD5

          50b0a73f95f29b07ecdda0eb240059c1

          SHA1

          c7214d176038595d39d613de21d5aaddfc7ceb15

          SHA256

          af41d79c3ab7d7882af9cd898098bf7412b40e1e14c76f4cb0e44ca9fe0df3ef

          SHA512

          6b93f5eb5d1d8bc85e6bb18fd4b17f3d5ca5ed1e83903009384748b012589029cc09f4d2cc07212e0f90fd75faafd10998b1934c87e1b3bfd018447ac9389100

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_44B7CEC7D7846BA12D21890D7AF2D759

          Filesize

          471B

          MD5

          a4b87abbd6c62f68e56ba308b57b8ae8

          SHA1

          837de872421bdc8c3925cfdac5a9e19865af0fba

          SHA256

          b85e10ccf5b1120fcecc3106240395f48527473d967d6ba8c99a4e6edb45d4fb

          SHA512

          55d2c39bb1dc19d32d1cc86ecfc23bfb2345114730112584792fe28bda0ac9e05565db1fe3666cbe197c34d08c011860c2af4ba42eccccce7d4def3005a00554

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DCD0D75871DDE826855F6AE0FFC4CA06_0DA877C2E9640F0817DE9740E60CBA04

          Filesize

          471B

          MD5

          f90ed4a56224d1288e2bf9872e56d969

          SHA1

          f05a98f0b920570b775447e3225369e60eefee1f

          SHA256

          eafd822a22365c101f4d9825f7023a1b1098e4399681cc88afb6cf01a412320f

          SHA512

          e6621356475a9e6e7cd1ecb4863aff8f148a7c77e6a0888e80316e6240d0bc34f35e5637b8b18b5601474534500ffcd63b319366efba694510a335012410e99c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_427CDB1C9AAC2BAE6B426DB11F126FA2

          Filesize

          471B

          MD5

          495d0cebc4f7c5d9fa682b287c948a77

          SHA1

          23c538c326f4b4af730c148d2c13cc8d64dafb41

          SHA256

          94bed1fc23b4eab2efa939140063e3d70f6a87bf48cb4583eb60f1498e9d8a98

          SHA512

          caa7ae881bad2ae1a515db060f384c91aaaec62e9b929e2f362763537169115e8cbd300febd199636352551f60657ffa62399ac12fcb8789a627acaf4e21710f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\250291F3FA7935E360EA9925CBAB58AC_127BFD1DDEBEBF233C3AB01551311C82

          Filesize

          404B

          MD5

          42fa37717edbc463ed72b96c984ee42a

          SHA1

          e17649374b604a060b198a57126e9ac0971c02dc

          SHA256

          49542450f9bff0245584378fef320a52dc75ac831d5bcfa2661c444f0d62c68e

          SHA512

          01fc67f33b9b7c2c81d9e0e9eda2ec5f502c446968303dead2577540ce631dadf22b5b2409c88abe1c66b3d8bbdf4a7a7db045080e0928a877b87770bea02a95

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\250291F3FA7935E360EA9925CBAB58AC_96B3BEC0DEC2F2E522B271032F313D00

          Filesize

          400B

          MD5

          47b461034e8971b5fd2f88a5a11d00bd

          SHA1

          8eff6feb5829b4438d5f9096b909124fa70fdd72

          SHA256

          e27c41114525a10b854a69b4a302062ff5ff43356d626760fa10064f06cade32

          SHA512

          2b14a0d5835465e6f41fdd322503b72191d47bc0c4339438c012ffb3284c8de6e505094fb2beeb1b6b53f379bcad1d4512938decd1eeb865cacdc2cbcfcb5da5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_44B7CEC7D7846BA12D21890D7AF2D759

          Filesize

          416B

          MD5

          01aa8cc28c914d8a539b52d7f8ce0949

          SHA1

          93847afe186ba6a02a66fc42426ca14889cc2ed8

          SHA256

          b2391d19ffab7ce2452c48b1eb950ba6d5ec92fe6125c6efdf39a7212f4927a0

          SHA512

          8d487ae0827f967904be8e74929a95885074855a51dddf433ac58a141445d3f42e1ac41fcd7d33ff774e6a2224c7d9aa104be22d74e9624c782bd068bb390fc9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DCD0D75871DDE826855F6AE0FFC4CA06_0DA877C2E9640F0817DE9740E60CBA04

          Filesize

          396B

          MD5

          7215fb876469bb21f40692d3bd2e5152

          SHA1

          8f81ee9b30e06c3096ab30148dfdb0ee081068f8

          SHA256

          0a840737be904f72645c6daa1f2112830faf90611301256d79352932737c06dc

          SHA512

          387b3d25623493aae40d4cb6195ea0e58668ec22c6a62a870edafa13dcb4f4e607a91bfe2a077526e8861735099357d09a5dc428396d6425302fae40aa2c96b1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_427CDB1C9AAC2BAE6B426DB11F126FA2

          Filesize

          416B

          MD5

          55e20522620ccc91018d5670d54c6bc7

          SHA1

          02c57e753e6e89bbb12ee4ddd4f1220c6f5f9160

          SHA256

          c2e6f2377b231f454107aa3e383ae051d267b06bc5d2fdc781d0cf536b114092

          SHA512

          2427bca11e991221a1e44ad738b57de969f9ffecef92dc933a7c34d9ecfd0d3380950bd4e4f792e46ba97b4db78266a77f8cfd6bf362dc032962b8aac470a969

        • C:\Users\Admin\AppData\Local\Temp\~WS225F.tmp

          Filesize

          122B

          MD5

          5eac7aa3a6a82868ce0f3f2f457a155f

          SHA1

          b9e602fc7fd5f3628ebb2b413b92816f8b62e108

          SHA256

          e6275c05155792429be975c2f8ea368df9e7976b6bbadf54764ad18c944deaa6

          SHA512

          4a59c6f521d02cb723ec20ed1718ac3dc918edbab05b5704a74e8997a8abba8ea1a9400511e06a4acb258dd96b249d84fc8aa2a612158bdf89523a9b31e57af6

        • C:\Users\Admin\AppData\Local\Temp\~WS225F.tmp

          Filesize

          1KB

          MD5

          698e337fd6c70417047e311ab31eb1b8

          SHA1

          6be8796c2aed800f78af65c3a69cfe2b4b659bfa

          SHA256

          e7201b3c36c52e5af3a295033d11381b4c4a7b5c4ef15c697360bdc1d38a8682

          SHA512

          29276f0174ee877a49beec2e1c45920736b4a0abd33364eb8d11f71e5a8487f596cc3b04291c36395a218480895b67b60c368c0b2137ece32d154d55d14963a0

        • C:\Users\Admin\AppData\Local\Temp\~WS225F.tmp

          Filesize

          1KB

          MD5

          585f0120d8a23dcc7dac65b9c2e66264

          SHA1

          ed35de5493712d09d4666ac3ed627b9325736364

          SHA256

          20a9a058a1f68aa4bb0adf18a59749e5ae624695615d463fe023b86dde26c613

          SHA512

          ee538309543a31c3479680a4576be39a3a15d7471ba3257fe97ae5f8ff9ec9edcde945752ec7bddbc886fcdb45b0f2371a2c0c101f59f2b2f205ce56d6acff55

        • C:\Users\Admin\AppData\Local\Temp\~WS225F.tmp

          Filesize

          4KB

          MD5

          1a3e54053f9675cbba96383893cb6ce2

          SHA1

          8b6cdd0640374d000c4dfb96c5d857a955221956

          SHA256

          bb7ce2a873a42dfa4c8d7c13da1622997021d3d1b708c964377ca5a722275042

          SHA512

          f991ea3e5e85a4f7d025849cc95a6161f1a6ede9e0a1bd3d00cc4d1201bd9ecd3875e18e5fe80944af1b7a9741f0941ba2fdd96f6b6a80df46df3895db9c0200

        • C:\Users\Admin\AppData\Local\Temp\~WSD8D3.tmp

          Filesize

          1KB

          MD5

          a073457540ea1c9b2154659a1bfa5aa5

          SHA1

          2d753d17615fec3e48dd9867281589bfecfb8450

          SHA256

          b952e60534d320ef7d804a94a0ffed865162f3b205f7f133dcc83aabe5cccaf8

          SHA512

          6b02a4a9655b8b927226e5f3e04a85d39af13268b02c78b38149ecbb60401958d827e49209ad0b5cde368cd2533fdc742bd2c493b68f4f2babe39da0c4b33a42

        • C:\Users\Admin\AppData\Local\Temp\~WSD8D3.tmp

          Filesize

          1KB

          MD5

          e9fa26963d09470edd1eb99e08192836

          SHA1

          9ffc9936bca4cfb7c771a5101a2fadea134b63c4

          SHA256

          5e1e5caf5f5711f433058eb2db5a9458a7f79d6d2f5064ab0f40b6dbfa53e626

          SHA512

          b5cc981a7b767372be53422a32548577836c2d4daa8947810917badea388ba36e2f1c3287be7b14e0bac1f80dcfde9510660f2203234c8ab494b27d416f9d86b

        • C:\Users\Admin\AppData\Local\Temp\~WSD8D3.tmp

          Filesize

          4KB

          MD5

          caf8e687517e158ebb535556590c13ec

          SHA1

          cd3701f7bb2b277573d5906b1172ae80a1e481ab

          SHA256

          c8477bdc13781bbbb50015827ee53aef18a4145a42fc5143e6e03ea441c58171

          SHA512

          437a85ee016c47f5dbe3945a1cf054f46d01d950a2271d889581e4a3ea4b31432fe5a23be13df53a1fbda16c05ee662363a6d1be70b913f6d5ef6d0a96acf9f6

        • C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_000.dat

          Filesize

          3.9MB

          MD5

          510024164bed9de12d37e886ff3c1dda

          SHA1

          48c29e186dce17a18ed8809594c81d67959c869e

          SHA256

          6b5c4ff9a859eb44dc50ab1af2b7aeb3fd2468e7561529737202d86db97b1dc9

          SHA512

          f24254a6e1fc44d9f727413f02a2dcfe40461579cf1e333ad2d0b0a0a82cb07a9e06e1abb474e44b262e3551760fe954bd6c3d9dd494c8a71720b48d8eaf9007

        • C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat

          Filesize

          3KB

          MD5

          bcddec6cbeffac989482570f1de3e570

          SHA1

          b8e0aa5f66c05be112ad4dfbab8c7435d22fbcf9

          SHA256

          7606c1f7f0f0278751c2a23f42b53a2e0f5b56517b5d1fea61a4d9d3943c2afd

          SHA512

          c8eb01ff5e988b38e79fc46bf74dde1bca10950f5fd95822d1236fe7c4c6c31c29593476639e0d34f92bc6b2df87a47b911fde5b1b8e053f032a3f0dd4370084

        • C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat

          Filesize

          10KB

          MD5

          03149db297b2e4f839988c98b384c257

          SHA1

          408edda2683378d78eb9ef12245dd1c58cbc9620

          SHA256

          7ae691c28724612a4402baacffb6be2a2ad5dc199ef08e603633e9682ce5bb72

          SHA512

          62eea5098a9f7bbee65aedad8aa1fd5fe624774126d512632801f7745b9be6d8ff6efe63305b4613ed525b85ab63518842fc7bbf5bdd808275a75da76a396c18

        • C:\Users\Admin\AppData\Roaming\OneDriver\out\PI_001.dat

          Filesize

          1KB

          MD5

          3ac23042858a9e84c565cfe31bb2ed5e

          SHA1

          0942ee1dbe2339cf05845a5b2a42d8f1e828a664

          SHA256

          90ae3732ff5b45dc2af06e4bd7e2c75d336ec36a8dc2efd6b2867a3e2ffdbd05

          SHA512

          4bdf18cd2924f30044bb6cc380312a50aa09d979b3afea1b2c8626b258e110226e62d1df02d27d338b87b2b66a3714990f48d732280f2703465c9c3f47174c3d

        • C:\Users\Admin\AppData\Roaming\OneDriver\post\mg_6334

          Filesize

          269KB

          MD5

          7a744f63e4debed1731d8f3e0d359bcb

          SHA1

          3a545d12f62282cb52d7bb6278a3933ce7f1e044

          SHA256

          366ad650c71b2948e00b607dfb1f34cbeb408895b913f042da4353baf8a2dcae

          SHA512

          ede167374b445d504e54887124ffb6449f44f09d1756f63e135cbfcf1308b078acd76073836888c2ef890de5779d3c4b39525c079195f89e765c3ccb9f78d283

        • memory/1592-107-0x0000000000B70000-0x0000000000BBA000-memory.dmp

          Filesize

          296KB

        • memory/1920-30-0x0000000000400000-0x000000000044A000-memory.dmp

          Filesize

          296KB

        • memory/3092-15-0x00000000004F0000-0x0000000000549000-memory.dmp

          Filesize

          356KB

        • memory/3092-14-0x00000000004F0000-0x0000000000549000-memory.dmp

          Filesize

          356KB

        • memory/3092-13-0x00000000004F0000-0x0000000000549000-memory.dmp

          Filesize

          356KB

        • memory/3092-12-0x00000000004F0000-0x0000000000549000-memory.dmp

          Filesize

          356KB