Analysis
-
max time kernel
64s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 15:06
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-BABE.exe
-
Size
167KB
-
MD5
ef228a906001229e469f7b61f89a0481
-
SHA1
d7bdedbf34f268353ef139e90455c9bfedbe5b25
-
SHA256
cd739c5a166fcea3510d2ab393e64da1ed3956cf19082258ec383e94b12baa52
-
SHA512
f191afd9e1059e4595a08ace41c65d2820ae6643a40e3c6877d6665462046cd7c8e0c3ff9a990fdad5912b663945f148787ac358c7b86d790e497a6acc2c45fa
-
SSDEEP
3072:mBAp5XhKpN4eOyVTGfhEClj8jTk+0hAy8nnDFysV19HWn:dbXE9OiTGfhEClq928nnDI4HWn
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1196 WScript.exe 5 1196 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\i chaya\telochka\nikloka.bat GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\runer.bat GOLAYA-BABE.exe File created C:\Program Files (x86)\i chaya\telochka\Uninstall.ini GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\surzik_masurzik.alo GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\nuzki.luzki GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\numerovat.naoborot.str GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\taktakanton.vbs GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\valera.alera.valera GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\zeloboika_karen.vbs GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\i chaya\telochka\Uninstall.exe GOLAYA-BABE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 980 wrote to memory of 1884 980 GOLAYA-BABE.exe 28 PID 980 wrote to memory of 1884 980 GOLAYA-BABE.exe 28 PID 980 wrote to memory of 1884 980 GOLAYA-BABE.exe 28 PID 980 wrote to memory of 1884 980 GOLAYA-BABE.exe 28 PID 980 wrote to memory of 1756 980 GOLAYA-BABE.exe 30 PID 980 wrote to memory of 1756 980 GOLAYA-BABE.exe 30 PID 980 wrote to memory of 1756 980 GOLAYA-BABE.exe 30 PID 980 wrote to memory of 1756 980 GOLAYA-BABE.exe 30 PID 1756 wrote to memory of 964 1756 cmd.exe 32 PID 1756 wrote to memory of 964 1756 cmd.exe 32 PID 1756 wrote to memory of 964 1756 cmd.exe 32 PID 1756 wrote to memory of 964 1756 cmd.exe 32 PID 1756 wrote to memory of 1196 1756 cmd.exe 33 PID 1756 wrote to memory of 1196 1756 cmd.exe 33 PID 1756 wrote to memory of 1196 1756 cmd.exe 33 PID 1756 wrote to memory of 1196 1756 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\i chaya\telochka\nikloka.bat" "2⤵
- Drops file in Drivers directory
PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\i chaya\telochka\runer.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\i chaya\telochka\taktakanton.vbs"3⤵
- Drops file in Drivers directory
PID:964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\i chaya\telochka\zeloboika_karen.vbs"3⤵
- Blocklisted process makes network request
PID:1196
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fc9bcdcc0ef6ab5f71065aaa78023eaa
SHA188b9ddd398aa75a42daca91a26c7538f13be5406
SHA256b5061a9b2deebab1baa353ff19548726a187912ecd210ed6a64dc53d0c071125
SHA512432c312fa95d1bfa503af3f5cefa05c5640eb24c6ec9f62c643d2fc4c8a98d4bccad7589df8da442c52b7e00513b13108d4d0f6fef29f5e69ab0e64d7558ffe0
-
Filesize
73B
MD511ed4b7aa113addd2c198563e84aa480
SHA1258372cbea7b75b0d93abcbea307059e0ec98dd2
SHA25615703efd02ecbce709b6df59a984c54c5713c5b2b7f6c4e359317cce27ab7680
SHA512958ce6fa3706f93257b150c7f2f1625f00d106d19919119fc291539c384a7025a9794875cafdf3987d3b8f9a5290e72881376425dcacd13da3422c3848be1099
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
84B
MD59ba3ef323fc62cd21104079ca7de3bb2
SHA1411d830fdefb2ec5a376d0f6c3aeca3b5b14aa63
SHA25675a26aa5af163060f735d8d8474935fff804cb52e80289e162fb2c8d6436161f
SHA512936ef03ef32981617d865d856275cd776af108933096e55bf4a964ecbd84f690411fb2d98a1338df1702c0499f2897cd8058b87170a66bd8abee2f967e64c0c6
-
Filesize
1005B
MD5cd7005b538dc2fd181ea5086aa61dc54
SHA1b887ef0b7e02635db98a9083bd918cd0168e9c5c
SHA256792d50ba5955652406ab77ccc9c7b738fc2d615a30cc540a63b1aff854469d01
SHA512a3282c5febc68be57995d069186e2d23eecdaf7fbca4150f3114ab45f25da1b9d97a459e1ffec49988213e661b6202fb86d34e0f1833c61f8157ec370397b6dd
-
Filesize
442B
MD52591ebe3c655b21a4baa232e437f0d5b
SHA1675456c2c0d393c8615a753f4bfe3faee25698a3
SHA256de01f2469a4494eb564ccb3ab6a406e840e0bd3f3ba059959770d1b33c34753a
SHA512ccdc5901fc5e92f5b0a187835fbf4eacd15d125fe3e5e93aa740fcc7274790cddae1164224f9b87b2ee4d10f2b35b20dec8c8752f76e5a160fdf0f791fe7a2b8
-
Filesize
1KB
MD5f2041b5c3c56cce2f8d8b1d8d66436dc
SHA165f29a8575f514bdfefada02037acbeb57619dbf
SHA2569a06fcc7ef43b6850c770a9304712d0cab6d343851322963540d52c43d6fe638
SHA512ffa9310ea6fb523468d2380bc4fd301bf3141779be5373be92b4ae7a8d625ed1f22ff45bdfb9cb9621ef894725530e1ca7a92b5e5c000526b3e64148c0682996