Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c.dll
Resource
win10v2004-20240802-en
General
-
Target
5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c.dll
-
Size
427KB
-
MD5
a11f717d224a2f229309c6b782e6810f
-
SHA1
4e97c89baf50699d2f49a296fd32847a2e11b1dc
-
SHA256
5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c
-
SHA512
da1cba063eb02b36a5a77d9a338de29940bdfa866f37b2c8daf4ffc0aa2e139ed3a7643a1dd61e35e04c278574a13c29ee6d758a76f82b23a38452d3c3f1615b
-
SSDEEP
1536:1oc54q3DWrYOBvnXzyTn25XZKz6ctkzIph3wessmPr1if/959M:1T54Wed7AzKJessmk959
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 4148 rundll32.exe 6 4148 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4148 rundll32.exe 4148 rundll32.exe 4148 rundll32.exe 4148 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4148 rundll32.exe Token: SeDebugPrivilege 4148 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1904 wrote to memory of 4148 1904 rundll32.exe 83 PID 1904 wrote to memory of 4148 1904 rundll32.exe 83 PID 1904 wrote to memory of 4148 1904 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ebe93ffd5359b09f31e63be4e531ec72002874c5edb53b936f0e2879ff0ad4c.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-