Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 09:28

General

  • Target

    adc39a303e9f77185758587875097bb6_JaffaCakes118.exe

  • Size

    230KB

  • MD5

    adc39a303e9f77185758587875097bb6

  • SHA1

    134d9e732a33413519341e4947013e7c7e521415

  • SHA256

    bfb8d13fcb64e3d09de2850b47d64492dbfc7bba58766546c1511f1fa59a64c9

  • SHA512

    6db6ff0de121a8f41e51fa011f17d14c9910a57ccf5bcb0237879a9e15f6d1eda209c5bae969c8edf5874ce44f90c826919697694aae86768c6169044d982230

  • SSDEEP

    6144:CpQpG5qElACE3GDOCG9FsEpkKBFaPwdgiCdp:8J5AGiC4DR3ao9Cdp

Score
10/10

Malware Config

Signatures

  • GoldDragon

    GoldDragon is a second-stage backdoor attributed to Kimsuky.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adc39a303e9f77185758587875097bb6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\adc39a303e9f77185758587875097bb6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4.[¾ÆÅ¿¬±¸]³í¹®Åõ°í±ÔÁ¤.docx"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:3020
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\Desktop\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx
        2⤵
          PID:1240
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c dir C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\Recent\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx
          2⤵
            PID:2500
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c dir C:\PROGRA~2\ >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx
            2⤵
              PID:1912
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c systeminfo >> C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2764
              • C:\Windows\SysWOW64\systeminfo.exe
                systeminfo
                3⤵
                • Gathers system information
                PID:1080

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4.[¾ÆÅ¿¬±¸]³í¹®Åõ°í±ÔÁ¤.docx

            Filesize

            50KB

            MD5

            dc2f8205b8dcfcfc8f2800d10a7c1499

            SHA1

            b5c944bd5872b688d0e8f5c482c7f0302d9f2f25

            SHA256

            887036c934ad6da0efd440a840fdac14242facbaefab1d2c3008bef61d7fdfb6

            SHA512

            bdc80b6b7a5434231d44b7f1f06d686769b8509b9c3fcceed3bda79492b9c28f6754bcda03ea738e82629f0febfd775103653e0abb9e4d9b3f22a9a358339eaf

          • C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx

            Filesize

            1KB

            MD5

            1901d55982cd9a9e6564e9506b1a449b

            SHA1

            3461e388a536175a0ce07ab6421bbfa2be9d5461

            SHA256

            d6718ee24f4da63a76646cc0886c7002d39236a149374bf93c6d4ee66330ec6d

            SHA512

            677042387861758ccf7694176ce231f2a3c121037843805ade3b48fb3b2f9107c0d108031fd74e3b48056395cd51f1de4bf02eda32a0a5e761bbc6e5dbe69d0a

          • C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx

            Filesize

            2KB

            MD5

            be66272b535790b73529e0e6148f8297

            SHA1

            b174d513e75d184eaf58cb4a7371a0ad963cd713

            SHA256

            b42991cbd7ca87510f1e6d7e8d1802a84a00cfe5aee21819feeef6411a61777c

            SHA512

            261b05b715c6e605900a8c2ca7bd8a9f842d05c65bfa7318fd7b97618e7431f23a9812b8d46413b05530a47435ee41012bfe153a9f3d8cb1dfa58cd9a7534da7

          • C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx

            Filesize

            3KB

            MD5

            2f875fb1e690420be1bf7d7c73391b12

            SHA1

            3cb6f6102890a25134d0f0e0f5dda0da0d2de400

            SHA256

            cb34bba21e30cea5deba32b54455c4174139670d524a2a86b29a4b523ad0f0c7

            SHA512

            b85fdcac8e30516dee039215b028322f263d51ab480fa783633798484354755f28f59c740f6c66ecab3f81f098a5560523b135069e458553b6df81ade7f4dd8b

          • C:\Users\Admin\AppData\Roaming\MICROS~1\HNC\wcl.docx

            Filesize

            5KB

            MD5

            a44904dfa2a32a7645f036f7a0f9aa57

            SHA1

            43b54d042d053b7d472e0fcf83dcdb6fbbb67458

            SHA256

            278ed24c695976ff9648fa92973371d4700608d04c20b31b863cf508c776d4aa

            SHA512

            4db3b547d862e5e79de82b5488d5ff05b32bd454d8ce37cf3bc5a20e203d779181be0977f1ca96a63bced6197b8ae0562509f3229f4bd5b4bc5402d6edf28f56

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            c97082d00dc5b764cb78769ab361c0be

            SHA1

            e981cf2623b523f8259fbd4b2532774a5f70cf2e

            SHA256

            16a171235718bfa55048fb8cb713c78f8aec87f4d1deacd4891e6172b54e6d3c

            SHA512

            c321828804145e594f8082fe2c1dd69950ab7b68e238040a9ead5993838de1012f170a457bfe4fd254d5f3a4bf15d9d573332f3242e133ab6bca56a751ad47b1

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • memory/1628-1-0x000000002F881000-0x000000002F882000-memory.dmp

            Filesize

            4KB

          • memory/1628-3-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1628-4-0x0000000070CDD000-0x0000000070CE8000-memory.dmp

            Filesize

            44KB

          • memory/1628-29-0x0000000070CDD000-0x0000000070CE8000-memory.dmp

            Filesize

            44KB

          • memory/1628-51-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB