Analysis
-
max time kernel
56s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20220812-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
150KB
-
MD5
c237cdbb2af3b3d54633c17505b551fd
-
SHA1
4bb27800290caa82502b343776c704eb139b6357
-
SHA256
118d9e99dcdbf4b5cac9bd32480ad70206743f5b2c4a96da9ff520c10869982d
-
SHA512
20178c92b19a9fa7a1c94e259cf29e395b258cba42ff10e439955ac6a63a8695da20f1076fb8c739de01c42386a7a54ce8f85e87fec9e19170aeb62156c428de
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiM5KjPWEHoOYbhwj:AbXE9OiTGfhEClq9dWEHoOD
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 472 WScript.exe 4 472 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\Uninstall.exe PHOTO-GOLAYA.exe File created C:\Program Files (x86)\dus_dezodorant\mouyus\Uninstall.ini PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\tutunas.nistyak PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\zelands.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\90909090.ico PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\readme.txt PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\fifa.vbs PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\dus_dezodorant\mouyus\drochka_peredrochka.vbs PHOTO-GOLAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1228 wrote to memory of 992 1228 PHOTO-GOLAYA.exe 28 PID 1228 wrote to memory of 992 1228 PHOTO-GOLAYA.exe 28 PID 1228 wrote to memory of 992 1228 PHOTO-GOLAYA.exe 28 PID 1228 wrote to memory of 992 1228 PHOTO-GOLAYA.exe 28 PID 992 wrote to memory of 472 992 cmd.exe 29 PID 992 wrote to memory of 472 992 cmd.exe 29 PID 992 wrote to memory of 472 992 cmd.exe 29 PID 992 wrote to memory of 472 992 cmd.exe 29 PID 1228 wrote to memory of 1040 1228 PHOTO-GOLAYA.exe 30 PID 1228 wrote to memory of 1040 1228 PHOTO-GOLAYA.exe 30 PID 1228 wrote to memory of 1040 1228 PHOTO-GOLAYA.exe 30 PID 1228 wrote to memory of 1040 1228 PHOTO-GOLAYA.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\dus_dezodorant\mouyus\zelands.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\dus_dezodorant\mouyus\fifa.vbs"3⤵
- Blocklisted process makes network request
PID:472
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\dus_dezodorant\mouyus\drochka_peredrochka.vbs"2⤵
- Drops file in Drivers directory
PID:1040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
817B
MD55a5975f7d66e20d79e164362b4bc60c3
SHA1f0ba5e0f9f3a799d5d4a170c823a6d4db6f20b2c
SHA25604b882e0b296560dd42cda7d6a6f4bb1d6df50cb5afcb676e1122f8a3b13eba5
SHA512e28aadf9d22922645b6a2ffaca1f0902958a6d17b00b932c8d846d8dc44814e2a7abafe9a97faf67b116c6318f3d350dffe6cbdb370473129abbad368083de66
-
Filesize
406B
MD52e47c1ca4f794324079858ec721f3483
SHA1ed79387dcf17731ed77943a39eb5571c395edea1
SHA25667dff8660edecac42d34525c27ba7b8f1749ccc8f0ab950be58827f9b20bd6d2
SHA5129630227e71dc218950501556523a4922e50915c7745d88f25e47de198571a464847f1201f793fbd0bea1979e85704dcc50c68e207f979ce39279b6d62d95321f
-
Filesize
57B
MD5bca1897073db94526d96e5911ba65a6e
SHA177e8717731dabe9b7308d96458e4927bdb113564
SHA256d91952cea951b7f2df935e6ec02d8e8b567a2bbaba0958f078f12088d456189c
SHA512e847870a7b571af74cb0f29f11872c5372a30e262012a544855fc5e1564c6424c8f0f585b259c2d9017b8829d34f4946a0a093846d2c21275ec50136e9bd9a08
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
3KB
MD5ad9a52ad18bf9e300396f58cdc6aed1f
SHA126af8d833a428bf63d3c869b8807002fe5e29247
SHA2567b83702814eb258c934516bd4d375f41acde004cb3902e9da7f6fd0d88588701
SHA5126c9dd5e44934d9ceacd4ce2f98186a41088b3a71647895f6a727e815a858b259c05a5bdf6aa9d513adfcaaddf85794a3d586b22789a9f02abef6da754ef61835
-
Filesize
1KB
MD50021c993f6e270022b22a1f77f6797c1
SHA18f0081a7735307c166ec3a995716dd5306723410
SHA25647195bd86b55e24282ce44af1889353c2ec9aafe4897757759ec05d263fa5dad
SHA512d65404624973d9e2fa8a16511ad0a1ab5a0f232a6ba74e84f69e3443496ea6a580f538cbcd7f160993315b4cfa40897dc548d70ff61f01a0b81a1437e09b5fd6