Analysis
-
max time kernel
57s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-PHOTO.exe
-
Size
151KB
-
MD5
b3f845ca159212f50fe671f8be7f31d5
-
SHA1
ae50522dce1d874cf8e34eb1304fdf915901b0c6
-
SHA256
8ac55857555aac7b3ef630e53efc5defb4d4b912cfc79ce3f186c123d61edce3
-
SHA512
57358f7ed4b4c1f2b7c307186be30382e531ef80f562b09b3532c6819b433a0efb86448b69687231488cbbac53d791f2a77493afc1f0412eeb900acb0026dd19
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hit4S1G8MIhFf:AbXE9OiTGfhEClq9nRJMIjf
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 676 WScript.exe 4 676 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\lichnost\kolombo\energetika_zenshin.ico GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\hoshesh.chtobi.ya.ushel GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\globalki.vbs GOLAYA-PHOTO.exe File created C:\Program Files (x86)\lichnost\kolombo\Uninstall.ini GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\kontrol.urv GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\squirting.bat GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\perednyaya.stn GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\demokrat.vbs GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\lichnost\kolombo\Uninstall.exe GOLAYA-PHOTO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1688 2032 GOLAYA-PHOTO.exe 27 PID 2032 wrote to memory of 1688 2032 GOLAYA-PHOTO.exe 27 PID 2032 wrote to memory of 1688 2032 GOLAYA-PHOTO.exe 27 PID 2032 wrote to memory of 1688 2032 GOLAYA-PHOTO.exe 27 PID 1688 wrote to memory of 676 1688 cmd.exe 29 PID 1688 wrote to memory of 676 1688 cmd.exe 29 PID 1688 wrote to memory of 676 1688 cmd.exe 29 PID 1688 wrote to memory of 676 1688 cmd.exe 29 PID 2032 wrote to memory of 764 2032 GOLAYA-PHOTO.exe 30 PID 2032 wrote to memory of 764 2032 GOLAYA-PHOTO.exe 30 PID 2032 wrote to memory of 764 2032 GOLAYA-PHOTO.exe 30 PID 2032 wrote to memory of 764 2032 GOLAYA-PHOTO.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\lichnost\kolombo\squirting.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\lichnost\kolombo\globalki.vbs"3⤵
- Blocklisted process makes network request
PID:676
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\lichnost\kolombo\demokrat.vbs"2⤵
- Drops file in Drivers directory
PID:764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55fdceae59f7527f9c3e80e7f64faebf6
SHA1bc8c113ac2b8c90af115ee34bd35c1e73889326d
SHA2568ec141fa458efa9a4e9bdc68a2c17c6bda291f4d4219d4cf11a0e9ef554ab078
SHA5120537287e768df3ce2f49c8fabc31281697a226885ecf616e6503044d33c91e9a63bca3aa03ade8978af0847b093a6086d6720a307c6885f0c07f7cfa15c3cd22
-
Filesize
264B
MD58390f814860b2ceaf35305432d6ec88d
SHA19f48221b57a53a6e8314b86200611c27e6a570df
SHA256bcf32b23f121fd8b6cf94cda3fd93e4df4ca7a1371fe9db1c7a42312c660a06d
SHA5125334855617566335506ba110c43fc55e22842fdf0902fb0318a1820fe2e7a67c373febb2ece109867dc14f46a5456efa4be45170df04ce0d40ee32b5e53ee6fa
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
89B
MD5494e4f5c6731bce0964e578708164f6b
SHA1d917975cd46f8ff88a80ab3b26d7b8816d108335
SHA2560e82235c770563b94a07287009963130cde3b0642db701b7e3b5c3fac5e64a70
SHA512d001db93eda7372d88d5fdba41ac3d84d6d2398333660af216dfc59ce0377bb5cd20e5b39ca736b2591337dffd01ed4bfc688fcaba196ed705a8eba7275359b6
-
Filesize
3KB
MD54e56d42e8fd0a03825f58baa95b51e5f
SHA1d74b2015a947668fd68d0e4156e6550a71e84e81
SHA256ca0e1a19840485e9c846098de6f829960bd7897ad1ebbcb8d501c5834a5f4c73
SHA5120404bc460c580b1b5735ef12ee3d7f4f0cffc43da67b5af86c3923e95bccfea661a453d02cbc9a3c98b53d005a43f65eb2113d99b8e2a086ada84dd8904d9449
-
Filesize
1KB
MD5e4052dfb3eb9ed5a08c840ef4c94dae0
SHA1a0c8e665659f19d42ac2752b54f735fafdc91178
SHA25621dbd76790026b47dcfe82b7e974474fce88c5e8ef55848e4ea6492923419ad0
SHA512f892629aabdea21bf617359c5e3da17eaf5f528f67045506eab46d1677f0ac5935777eb14e60b9ab61566eba2239255a89d4752ab41ee27ed03fae7982d4ab79