Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20220901-en
General
-
Target
GOLAYA-TOPLESS.exe
-
Size
237KB
-
MD5
e61bd730e06e58b62b401ec80fee428e
-
SHA1
46833a190b51364c9e965c06e52e6b04445265cc
-
SHA256
32c82a37972dafc4b423b117c5dfbff89cb2a6e35badecab68119e1d0ab48c7a
-
SHA512
b41181d0cbf9223b40a161072e13b03d25b90889adc23e603fd9212e6b654c51e8314e4319cb9b16e9580037ea5d24d571d8f499464c0e9f431cb9acdbbdac62
-
SSDEEP
3072:tBAp5XhKpN4eOyVTGfhEClj8jTk+0hGrGivgXrC2S7yfH84zsEn/iOjt7hM8Wjzd:obXE9OiTGfhEClq9bweKRZLoJJUG
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2024 WScript.exe 4 2024 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\looopodokopo.bat GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\Uninstall.exe GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\boiii_ffffpo.vbs GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\dooolina_op.ppp GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\slonopotamus.oui GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\slonopotamus.oui GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\slonopotamus.vbs cmd.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\1.txt GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\looopodokopo.bat GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\Uninstall.ini GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\boiii_ffffpo.vbs GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\dooolina_op.ppp GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\Uninstall.exe GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkody_dap\novaya\slonopotamus.vbs cmd.exe File created C:\Program Files (x86)\poddddkody_dap\novaya\1.txt GOLAYA-TOPLESS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1880 2032 GOLAYA-TOPLESS.exe 26 PID 2032 wrote to memory of 1880 2032 GOLAYA-TOPLESS.exe 26 PID 2032 wrote to memory of 1880 2032 GOLAYA-TOPLESS.exe 26 PID 2032 wrote to memory of 1880 2032 GOLAYA-TOPLESS.exe 26 PID 1880 wrote to memory of 2024 1880 cmd.exe 28 PID 1880 wrote to memory of 2024 1880 cmd.exe 28 PID 1880 wrote to memory of 2024 1880 cmd.exe 28 PID 1880 wrote to memory of 2024 1880 cmd.exe 28 PID 2032 wrote to memory of 1728 2032 GOLAYA-TOPLESS.exe 29 PID 2032 wrote to memory of 1728 2032 GOLAYA-TOPLESS.exe 29 PID 2032 wrote to memory of 1728 2032 GOLAYA-TOPLESS.exe 29 PID 2032 wrote to memory of 1728 2032 GOLAYA-TOPLESS.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\poddddkody_dap\novaya\looopodokopo.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkody_dap\novaya\slonopotamus.vbs"3⤵
- Blocklisted process makes network request
PID:2024
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkody_dap\novaya\boiii_ffffpo.vbs"2⤵
- Drops file in Drivers directory
PID:1728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
574B
MD5dd2d2e5b20365df4239d2a39ad2e4e6f
SHA1ce1e1625a34340feef885f576055688c6d35de08
SHA256d12067fde5906b541028d6fe43ccbb72e617ab0ef383efe8198c1dd2d82ecb60
SHA512a750cbf19dd558838b499247551457bbaf02378bc7d7624a614dd1ba3c0d6d0ce6a0b52f827ce26684f8f64d1e8230109ce0a6cd370abb9c6980860efaf1e109
-
Filesize
51B
MD549abe10db22821407754c0864fd6167d
SHA152cecc3070034bc3f0c193aaafbe2655355e4295
SHA256bd00230b5cbf7586b3781b47985c7cb98bd0d6984b1993dad81db28f885959d3
SHA5120dcc60053ac878fbf531cc67f5959d16abce03c36a8a50a53385bdda79cef116bab32c9fa57f102252da045ab5b92f10d182126a9f1effe9b0757ce6930bd1ca
-
Filesize
1KB
MD56d0c88956089ac1294ba0f84abfcf93e
SHA15c7d83487bf06ab592b3d8bb232be3801ee5ec0b
SHA2567d07d9ec0ebd2e8470a4c0b23b83dc4e1474ed45df634a9b14e5253cd6c694ff
SHA5125fb6743ca2770c3503490220a51d3085d1a41020d858f06b172a7f7d6978aca11b31d84e84bf76e43da29ecfca9c9de31f5260dd96624a7536af0e6b2f31f653
-
Filesize
255B
MD50eb87cb29302476c631ce380a7e77a36
SHA15ed750b8c668bde83daf91adc9976b1d4f9bd993
SHA25602e0519dcdc7d3d41a3360802f83f229530e6062c630fb9a457c318d30ad4d68
SHA5124358066f9ee82e003220f4d3984fae1a54310fcf7184874325da4f07a264e472994caf8b203ab59fbda4059eb321fba6fb2b07c274fa99db2e9fb0e391c77aa2
-
Filesize
255B
MD50eb87cb29302476c631ce380a7e77a36
SHA15ed750b8c668bde83daf91adc9976b1d4f9bd993
SHA25602e0519dcdc7d3d41a3360802f83f229530e6062c630fb9a457c318d30ad4d68
SHA5124358066f9ee82e003220f4d3984fae1a54310fcf7184874325da4f07a264e472994caf8b203ab59fbda4059eb321fba6fb2b07c274fa99db2e9fb0e391c77aa2
-
Filesize
1KB
MD596482b57d86df40e4b2c2527dd434049
SHA17889de80125578107721c9040a02320b20493665
SHA2569009e6249d0d5bb535ad6a089b0bf58cd8392780607cdc977200bfd4d4d86d10
SHA512d3aa63756032cf2abb119ec0142aab17bda1f0810e83356c1ef8bdc2f5da7f9d5e28a67e919bb01c73cc154db569efb865a4d819f1ebb6de4e8f25ed7d06acb8