Analysis
-
max time kernel
149s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20221111-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
237KB
-
MD5
a58d8465f840e1fcad4d41d738877384
-
SHA1
9f4111ccada5d50048488955a35f27eccb2fd503
-
SHA256
7946f8a23ac41d420ba85a4e71c108f586cec3b2e8b8a3448f5e4d19404d785f
-
SHA512
8f30fd6128490effb87ca8831843eb7bc1b3a6e31fe0a989b35c1005d050e1b487124aebf21ffa38d2adceb48dfc7dc28835b5ff463a05f0db8c96a77ad5b405
-
SSDEEP
3072:DBAp5XhKpN4eOyVTGfhEClj8jTk+0hT6IPEaG562E3nV9uVSUO2I+Cgw5CKHq:ubXE9OiTGfhEClq9gTuRJJUq
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 35 3704 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation PHOTO-GOLAYA.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\zaryadku\proebal\slonik.konchaet PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\Uninstall.exe PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\routerpoi.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\happenewyear.vbs PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\pizdets.poezdets PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\pizdets.poezdets PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\Uninstall.ini PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\slonik.vbs cmd.exe File created C:\Program Files (x86)\zaryadku\proebal\1.txt PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\routerpoi.bat PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\Uninstall.exe PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\slonik.vbs cmd.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\slonik.konchaet PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\zaryadku\proebal\1.txt PHOTO-GOLAYA.exe File created C:\Program Files (x86)\zaryadku\proebal\happenewyear.vbs PHOTO-GOLAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings PHOTO-GOLAYA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3684 2132 PHOTO-GOLAYA.exe 86 PID 2132 wrote to memory of 3684 2132 PHOTO-GOLAYA.exe 86 PID 2132 wrote to memory of 3684 2132 PHOTO-GOLAYA.exe 86 PID 3684 wrote to memory of 3704 3684 cmd.exe 88 PID 3684 wrote to memory of 3704 3684 cmd.exe 88 PID 3684 wrote to memory of 3704 3684 cmd.exe 88 PID 2132 wrote to memory of 3636 2132 PHOTO-GOLAYA.exe 89 PID 2132 wrote to memory of 3636 2132 PHOTO-GOLAYA.exe 89 PID 2132 wrote to memory of 3636 2132 PHOTO-GOLAYA.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\zaryadku\proebal\routerpoi.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\zaryadku\proebal\slonik.vbs"3⤵
- Blocklisted process makes network request
PID:3704
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\zaryadku\proebal\happenewyear.vbs"2⤵
- Drops file in Drivers directory
PID:3636
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
598B
MD5534f3a8eaed70bd537098c1bb127dcd8
SHA166be8ac47602b67c051d3692500cc24a6807c5b8
SHA2561b4edd294a3175156b5c8372267d55995a38a0c243c2a3376306b26da1f81b3b
SHA5120d0142db36343d391a0aaa44f844c7c95d78cd9ea6477336f5812c9b9d539f4210fc90e81aa7e286c3fb28a18926dd6e8361cd81a51feae9a03c82f41186f961
-
Filesize
65B
MD57cb8698f0d38b859c2162d8d4012e91e
SHA10936d45df25ae05a6a47404ebfa04f10758b158f
SHA256b9f7186bbcb607a8f0870abc34c4900ed94e94593dba0b4446dd65b516d21545
SHA5125e14a31aeedf67a4cb95ec88d5f79498e4e101a9ca7f1a032c762a674214f20c98fd9427471a5541464efd2a53618257ceea2426ac7a6a0f76c728d3597f805b
-
Filesize
1KB
MD562f4367de042103d398e9f82f81015db
SHA1f6bf66b78ff904c30136a64dc79297310b2629fd
SHA25670844e73c9bf914349bab174f8ac7e7270db9cc129f5cc41f41e005d747eb015
SHA51221643331bb15d53e76e3d6a871651c1a72c0909111155d701338612dc334d9e2cfbc01a779e3a0d283af7c54a5c3ab0143ed9ccbf9f6658de7bc822d31e444a1
-
Filesize
261B
MD52220c2ba3ab6dd671cfbc80fb66e8989
SHA1c2698ec660cff13e102676af7e8426a44b68efe7
SHA2564ff356480adae2f8e3e8e1ab665c2fb0b23c6c964d20c65edfb220ceb984f31e
SHA5124b660fe9082965eaa0a2e5150cf9e6fca8bbd356af9d4cb09deda878a513f2074161e7b0f36a469a8293b985794f4c21afaff196ac4c80b83911b65c801a100c
-
Filesize
261B
MD52220c2ba3ab6dd671cfbc80fb66e8989
SHA1c2698ec660cff13e102676af7e8426a44b68efe7
SHA2564ff356480adae2f8e3e8e1ab665c2fb0b23c6c964d20c65edfb220ceb984f31e
SHA5124b660fe9082965eaa0a2e5150cf9e6fca8bbd356af9d4cb09deda878a513f2074161e7b0f36a469a8293b985794f4c21afaff196ac4c80b83911b65c801a100c
-
Filesize
1KB
MD5776b152fc7b16cdb6f03b535016b30d7
SHA1535c5c292c16acda59325c59c1327dfe39499334
SHA256802d784cf685137a021b5a2c86d32e755ddde8212de5d320f1c4cd97feff735b
SHA512fbcd9e8283b69170bdee143111a26e22778bf792b5bb0e00db524b087008b23a2fdca3c772b3cb1631914772e91699cffe7a45023e717c204f30e99f67759090