Analysis
-
max time kernel
63s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
13135ec7bee7db877b3654059374ebde
-
SHA1
f3f3a8c6b395211ebdbb2a73769e21c401d34e0c
-
SHA256
7dbe9bdea098a5cb0608135c1705d2aa2e080ebc4146a02001a793ff0970252a
-
SHA512
3f7eb418322b1abbe60b2fa6845ffb3e530808739b0dc542707c713f83bc4b02a4a1568a28e9badeb71bd5512e14a47387abe80b2edf0b440f2c40cc3cc08db8
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiqtAhp:AbXE9OiTGfhEClq9QtAhp
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 856 WScript.exe 4 856 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\all2.vbs GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe GOLAYA-PHOTO.exe File created C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\hhhh.txt GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\koollapsa.bat GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\slonik.po GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.pp GOLAYA-PHOTO.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini GOLAYA-PHOTO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1776 1584 GOLAYA-PHOTO.exe 26 PID 1584 wrote to memory of 1776 1584 GOLAYA-PHOTO.exe 26 PID 1584 wrote to memory of 1776 1584 GOLAYA-PHOTO.exe 26 PID 1584 wrote to memory of 1776 1584 GOLAYA-PHOTO.exe 26 PID 1776 wrote to memory of 856 1776 cmd.exe 28 PID 1776 wrote to memory of 856 1776 cmd.exe 28 PID 1776 wrote to memory of 856 1776 cmd.exe 28 PID 1776 wrote to memory of 856 1776 cmd.exe 28 PID 1584 wrote to memory of 1492 1584 GOLAYA-PHOTO.exe 29 PID 1584 wrote to memory of 1492 1584 GOLAYA-PHOTO.exe 29 PID 1584 wrote to memory of 1492 1584 GOLAYA-PHOTO.exe 29 PID 1584 wrote to memory of 1492 1584 GOLAYA-PHOTO.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Company\NewProduct\koollapsa.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\al99999.vbs"3⤵
- Blocklisted process makes network request
PID:856
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\all2.vbs"2⤵
- Drops file in Drivers directory
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD50ed4d363b23de2f2e155f12a2caad6c6
SHA1ca01261735a2368e29c3b2695e0156a447099aa2
SHA2560832d445cecf5f174085cb2209c073f83c5ddc48c95d8d1642eaba37c2ab5567
SHA5127d889d3be545c1aff88db384923d88aa229fbd66540dae0b788e12ed58573e4b3f7c52c2d5db18343fc3a33382b6e169c2cca7233778700da1df5cd16d055e4f
-
Filesize
234B
MD50ed4d363b23de2f2e155f12a2caad6c6
SHA1ca01261735a2368e29c3b2695e0156a447099aa2
SHA2560832d445cecf5f174085cb2209c073f83c5ddc48c95d8d1642eaba37c2ab5567
SHA5127d889d3be545c1aff88db384923d88aa229fbd66540dae0b788e12ed58573e4b3f7c52c2d5db18343fc3a33382b6e169c2cca7233778700da1df5cd16d055e4f
-
Filesize
678B
MD5bf72f45eb64682832ec502a1d3d2fe36
SHA1a77c4751b9a679c0b31c1d854dffaf0d2886d4ab
SHA256c2efdbb412e438c9d74954778935676013f4485bf16d8076b23c191a3f81fa05
SHA512438832c895db8d26dcbfb9ac3575d4f6478649c871ca9c52b588cec751a5eb6ad187c5f00a0b6d150205036a306e4ab8000a1f16a54cfb7d783b4492a1be0407
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
3KB
MD52180c017ea68ff374d8a37aea32f6b8d
SHA1bdc5a525249a41e434cba309e79b8eac0aeb6865
SHA256e541a4b41252542251096f388810d4ec2d0e1f1e96f222134982d95581abd3a1
SHA512a70d00862535e055fc7283d367921f1f037ea1fce71b57bdd74463f00428eb2dd5b8006cb61ce882e586cce8825c620f202498ceaaa8d727cf16a5d4aef29aca
-
Filesize
65B
MD5ad13b5db4d7ddfa3f5239e5b5f06e8e5
SHA124c28d82adacac1b118f5d1abbc12218583431e9
SHA2567dc870d6e2fb495c37409b887f79e02d74bdd6bef3ba45a8ac8a3003d33ae73e
SHA5124b71633dcf9f5ad986cc09c22da7956a7b006563df4e752cc9d3507743c4c3dc55a309a68fe17ef8a0c6779ae694dd55b7f61c4b3638cf8806722a6fbdf8af03
-
Filesize
1KB
MD50021c993f6e270022b22a1f77f6797c1
SHA18f0081a7735307c166ec3a995716dd5306723410
SHA25647195bd86b55e24282ce44af1889353c2ec9aafe4897757759ec05d263fa5dad
SHA512d65404624973d9e2fa8a16511ad0a1ab5a0f232a6ba74e84f69e3443496ea6a580f538cbcd7f160993315b4cfa40897dc548d70ff61f01a0b81a1437e09b5fd6