Analysis
-
max time kernel
57s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 17:13
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-TOPLESS.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1284 WScript.exe 4 1284 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\salst\ogurets\122.txt GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\all3.vbs GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\salst\ogurets\Uninstall.ini GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\polenolll.pof GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\lit.vbs GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\Uninstall.exe GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\podkati.bat GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\salst\ogurets\stuckja.jol GOLAYA-TOPLESS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1600 wrote to memory of 940 1600 GOLAYA-TOPLESS.exe 27 PID 1600 wrote to memory of 940 1600 GOLAYA-TOPLESS.exe 27 PID 1600 wrote to memory of 940 1600 GOLAYA-TOPLESS.exe 27 PID 1600 wrote to memory of 940 1600 GOLAYA-TOPLESS.exe 27 PID 940 wrote to memory of 1284 940 cmd.exe 29 PID 940 wrote to memory of 1284 940 cmd.exe 29 PID 940 wrote to memory of 1284 940 cmd.exe 29 PID 940 wrote to memory of 1284 940 cmd.exe 29 PID 1600 wrote to memory of 520 1600 GOLAYA-TOPLESS.exe 30 PID 1600 wrote to memory of 520 1600 GOLAYA-TOPLESS.exe 30 PID 1600 wrote to memory of 520 1600 GOLAYA-TOPLESS.exe 30 PID 1600 wrote to memory of 520 1600 GOLAYA-TOPLESS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\salst\ogurets\podkati.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\all3.vbs"3⤵
- Blocklisted process makes network request
PID:1284
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs"2⤵
- Drops file in Drivers directory
PID:520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD5559c8ec72bf701870603c0f79907234c
SHA1f3a809dee961f1f3d6c5c384596504981273fd77
SHA25651611da1f1bedbfc97fa015b41bc5e5ebfe61b8eb2aca050d440c642dd0c41c6
SHA5126616f4ac087e1b9e6f1bff0e5d844e316cddd5a2409e97b88118410475ab1bb544d59d6006940f74cad176470bc58112608d2b7bc01e71f0b232c6cdfa551a6a
-
Filesize
826B
MD5b0350182dcd735cf07e9c501cff5e7a1
SHA16dc80006d0d6e0e1d136826ab0e2a6c9bc61b950
SHA2569659ca4ab0f584f9f3bbb5135eb0d12ebc3d24cbbdc719c7d7338f59d401f410
SHA5123ba96b3082f3a98a3adc452d1f52284bd49b2d035f0fbe960738324b624b8e2a70254bbed7a7f0d29ff6f5cd756f01f29d3fbba75419d9ed652879cdf79312ea
-
Filesize
3KB
MD5a131962527d3b919e7c23267a2b0cdc4
SHA1e7d2e84d765b7c2011bb91c78c93da33227dcfc8
SHA25672375ee539442bf129b7ad6c3dbc68728b16a2106cef403000f26a833dd12322
SHA512cfd69e3b434c9b4262b929b02e7616151f2960df56cc632f8c0e4d6e3a2f724c34db7d71e1bc984bccd9cc0a39a77e6da86cc4d675c2af0d3ae09bf981694cbc
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
64B
MD561391af0a6e3c8f6d08b46b623eb3c2e
SHA1ffe8b74b2c5920b13fabd2f203ab2c6171be663a
SHA256d0a90a49e36d502e4903b5062712bca9006ae0afd349d4e9a74789eb68189685
SHA512f98bbbb3602936619714dcf787c3589948291e6e7a0c69f404e8b636a3c7ce608ac400b589b828f31270c550ef28f8a741fc40d8d018e28f0fe4512d50140180
-
Filesize
1KB
MD50021c993f6e270022b22a1f77f6797c1
SHA18f0081a7735307c166ec3a995716dd5306723410
SHA25647195bd86b55e24282ce44af1889353c2ec9aafe4897757759ec05d263fa5dad
SHA512d65404624973d9e2fa8a16511ad0a1ab5a0f232a6ba74e84f69e3443496ea6a580f538cbcd7f160993315b4cfa40897dc548d70ff61f01a0b81a1437e09b5fd6