Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20220901-en
General
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
210KB
-
MD5
e3ed299ce4982a14a6636310994345e3
-
SHA1
3734d5ef93aa6a4f5c3f4052e4bd4e20a3218e6e
-
SHA256
93797469edd71571dac60f7b6e6575904803e00f3ad8504bd341570f64f0bd3e
-
SHA512
9d3c33a0d826406c359d5bda8ce79348d31540ba3cbed904806cb2aabba5275169f417e5c6e338b102e557c4e004fcecee1504e3b08bbc70eab5d579e42233e8
-
SSDEEP
3072:EBAp5XhKpN4eOyVTGfhEClj8jTk+0h8xwNhQs+Cgw5CKHG:TbXE9OiTGfhEClq9hwCJJUG
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 4836 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation GOLAYA-DEVOCHKA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.exe GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs cmd.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs cmd.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\opasdkjsadflijsldf.wf GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.exe GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.ini GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\opasdkjsadflijsldf.wf GOLAYA-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings GOLAYA-DEVOCHKA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1620 1352 GOLAYA-DEVOCHKA.exe 76 PID 1352 wrote to memory of 1620 1352 GOLAYA-DEVOCHKA.exe 76 PID 1352 wrote to memory of 1620 1352 GOLAYA-DEVOCHKA.exe 76 PID 1352 wrote to memory of 4836 1352 GOLAYA-DEVOCHKA.exe 78 PID 1352 wrote to memory of 4836 1352 GOLAYA-DEVOCHKA.exe 78 PID 1352 wrote to memory of 4836 1352 GOLAYA-DEVOCHKA.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:1620
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs"2⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
PID:4836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52fb5748a38815def7a0db7ca7ac5bad6
SHA15cdf3f0c71398f249f0a5f4bf77a1875b2a88bf8
SHA256f9196c6301a31804528095e78512bf4ffe5fce1d61b631918a85225e84af305d
SHA512b55727706a27495a8027d5fe04146cd7871f7f56a88f985adee493629e70d8a1d37f075aacec4cb235e891d52296a7a443d26bf79230fd4492c3ab8a3b9c7d45
-
C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua
Filesize1KB
MD53c939845d4a469ddd0889a669d649720
SHA16afdc41966133da8346d01b6106b9ace9db07b56
SHA25656dbb7ee03c11a918954494c9343d162e7bc2ecebaf1fec3311fd22dd637d67d
SHA5129cd7a8c062e7314b1bbecbbc12996c9b413b58eafadf7600153ec7bf8e1f7fcbd7b2f4659636d5ef9fa7b23e10f7ef376c7ef24fd1090f8fc6bf524d296eb71b
-
C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs
Filesize1KB
MD53c939845d4a469ddd0889a669d649720
SHA16afdc41966133da8346d01b6106b9ace9db07b56
SHA25656dbb7ee03c11a918954494c9343d162e7bc2ecebaf1fec3311fd22dd637d67d
SHA5129cd7a8c062e7314b1bbecbbc12996c9b413b58eafadf7600153ec7bf8e1f7fcbd7b2f4659636d5ef9fa7b23e10f7ef376c7ef24fd1090f8fc6bf524d296eb71b
-
C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro
Filesize87B
MD52048e7f377827684952eac6638737664
SHA1177f0e8e28f88204df60059d64c6ec3bc108a673
SHA256e69334131aff4bd540d8972b135c0510f9e7e310c4513df87793923b464ae688
SHA512624f4865cda8892e6521ff1878cb290b9329fd7eb82034b3224a0358678d2d6eaa20c287efbe69b6d6fcc654c2ee4a36d3235f688c817f44f0e67d6f55ad7916
-
Filesize
1KB
MD5712e39a3a262f220a58df41e0680f7c0
SHA14285643061e7360290fa6614e9eb0bb4aa9ada03
SHA2560d746d368cc41605f9de5e5cd84475398f4faac19e1e4306b16db2a339e21a86
SHA512dcfc8073785d5f8d1f56a83f2d0dd9a7d68629330169202cc1fd53df6ab9dfce4ed3c6a5a531ada375241c089179d8f61f39a594a835e53ba6ed77df42d0f14d