Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
239KB
-
MD5
471ee52782395766d6e60db78eea6bf1
-
SHA1
86886592b9281a9b640c06b3cb7742955405d0ee
-
SHA256
f251a94739170aaf1ad716e6f31645cc3bb2350fc5e0ccc135511d9618f0386c
-
SHA512
c2759eff3ce5ebebbe779bda325a1b35d1c9a10c06f15c99f1b3ac760ed9376540a20c0bb99f406db46b6e20ae361ac7c41bc5b1edfc981daed89bc2f89327dd
-
SSDEEP
3072:OBAp5XhKpN4eOyVTGfhEClj8jTk+0hbRBrICPwXAFxTTw1BV56nt1UrknjaT5/e4:lbXE9OiTGfhEClq9aW6EBMbJ4JJUG
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 19 5096 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation GOLAYA-SEXY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\russkaya_vodka_chto_ti_natvorila.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\sloupokerstvoederosngoejbfawfw3jfbkksksh0o3i9f.gggggg GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\Uninstall.exe GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\stolprovodetokompstoitnanem.vbs cmd.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\blevantina_edet_na_more.vbs cmd.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\russkaya_ssamogonka.oik GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\sloupokerstvoederosngoejbfawfw3jfbkksksh0o3i9f.gggggg GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\stolprovodetokompstoitnanem.ogo GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\blevantina_edet_na_more.vbs cmd.exe File created C:\Program Files (x86)\win23driverKernek\batreya\russkaya_vodka_chto_ti_natvorila.bat GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\stolprovodetokompstoitnanem.ogo GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\Uninstall.ini GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\russkaya_ssamogonka.oik GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\blevantina_edet_na_more.ore GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\win23driverKernek\batreya\blevantina_edet_na_more.ore GOLAYA-SEXY.exe File created C:\Program Files (x86)\win23driverKernek\batreya\stolprovodetokompstoitnanem.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings GOLAYA-SEXY.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4628 wrote to memory of 688 4628 GOLAYA-SEXY.exe 80 PID 4628 wrote to memory of 688 4628 GOLAYA-SEXY.exe 80 PID 4628 wrote to memory of 688 4628 GOLAYA-SEXY.exe 80 PID 4628 wrote to memory of 2272 4628 GOLAYA-SEXY.exe 82 PID 4628 wrote to memory of 2272 4628 GOLAYA-SEXY.exe 82 PID 4628 wrote to memory of 2272 4628 GOLAYA-SEXY.exe 82 PID 4628 wrote to memory of 5096 4628 GOLAYA-SEXY.exe 83 PID 4628 wrote to memory of 5096 4628 GOLAYA-SEXY.exe 83 PID 4628 wrote to memory of 5096 4628 GOLAYA-SEXY.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\win23driverKernek\batreya\russkaya_vodka_chto_ti_natvorila.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:688
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\win23driverKernek\batreya\blevantina_edet_na_more.vbs"2⤵
- Drops file in Drivers directory
PID:2272
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\win23driverKernek\batreya\stolprovodetokompstoitnanem.vbs"2⤵
- Blocklisted process makes network request
PID:5096
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820B
MD54e0ba70e25a10a41ab7f3df17350884b
SHA1530967e7981801923e11fa1c7016ee96cc4fcf2a
SHA256faf5106c623b2604eaeb4e660e5a2773a5c8f77fcfaf17fb2f3de8a95f368e24
SHA512b1cfcb19de374a8172f033b9865a66a5de71cea7b4fcafef56b138b1d9d8ec96f4f197f87112ffbb80c4b10c7027d3433cc5b1b0082ac0a6eaafb15e45fa7c5a
-
Filesize
820B
MD54e0ba70e25a10a41ab7f3df17350884b
SHA1530967e7981801923e11fa1c7016ee96cc4fcf2a
SHA256faf5106c623b2604eaeb4e660e5a2773a5c8f77fcfaf17fb2f3de8a95f368e24
SHA512b1cfcb19de374a8172f033b9865a66a5de71cea7b4fcafef56b138b1d9d8ec96f4f197f87112ffbb80c4b10c7027d3433cc5b1b0082ac0a6eaafb15e45fa7c5a
-
Filesize
140B
MD5dae61dbfd043dac82526273abec1fda7
SHA1670b1eaad8f3b90e64b5fe86a21131b5b26a88ad
SHA256aa3372f1891436b400d2a9801240d4d873e9b8536017e746442981b9ffc34e0b
SHA51234bf3873ae6e4847c0e0ab4ee2abcb65c459702e0b7ee1eade2cd28eb55593e8e3f242f957d66b87faed53b77d7360dc4a56158159445455b207757212205ae3
-
Filesize
1KB
MD5a0e4b0af6ef6d5905942811885bebf5c
SHA169ea8a265dc04c30d5fccbf74b47f73f00e3199c
SHA2563e88b7dc1ec84123ed853fdce0aae4816b1fac10c78ee419af5f98c4210ec55a
SHA512248585e56bb7e2b5bfd6789be145e2f59aa054a69779ffca9057eab26a667973f3c0bcff6425103dcd0abc26310da0173f4943931072f6bb0499453eaed56ed4
-
Filesize
689B
MD52ee41d11db94e703fb0c2ed233cebb09
SHA1aae4a0b05a112060f19a7d851aa32f2f02fe4670
SHA256daecfc85967a5c12620ad05274e70d969d7f51fe368dbaa588d530f341ada135
SHA51278f6120559d75322d6bc0b3a638d980599ddf81fa28f403dd751ff89b5544d6a4303660b91d07e4ce077155ef67240d2bc8f6c5561ec033ce8ad162cd400c170
-
Filesize
689B
MD52ee41d11db94e703fb0c2ed233cebb09
SHA1aae4a0b05a112060f19a7d851aa32f2f02fe4670
SHA256daecfc85967a5c12620ad05274e70d969d7f51fe368dbaa588d530f341ada135
SHA51278f6120559d75322d6bc0b3a638d980599ddf81fa28f403dd751ff89b5544d6a4303660b91d07e4ce077155ef67240d2bc8f6c5561ec033ce8ad162cd400c170
-
Filesize
1KB
MD5e756b71be76cd80a2dc3ae04deb9a309
SHA17cc93e6c927aa0bd1c83e5696e6195562ed27525
SHA2564751e738816cbeae753aff68419fefd0817d6969b60db28b94d3de743abc20e7
SHA5128db0b9f09ad3e16c1eddc900d0c75fdf447044fdaceefc44e778bc38dc62289fd0e134dd40453f0b9911a14c423cb92c3b6ef28bc16a66cd3aaa7ddab9b3a1a5