Analysis
-
max time kernel
112s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 02:04
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
237KB
-
MD5
ba2bf7358006651b7f089cf5dd96cd32
-
SHA1
939048fee823c35f23c22aed5dceca97a8be0c85
-
SHA256
21f6371b68404f168d5861e5fde1170eda93d81d86a86cc765bcd30d732b78bc
-
SHA512
c715e72a63150192bbb8a70302512540d7ada89bc08ee50bf7e40eb8d25664d63ac7c3fc9d5dbc145d062e729a06dafe8e67649f0095f426ac8b4ea3156101f3
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeSw+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGeGJJUS
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 4888 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation GOLAYA-SEXY.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\dooolina_op.ppp GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.oui GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.oui GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.ini GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs cmd.exe File created C:\Program Files (x86)\poddddkod_dap\novay\1.txt GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\1.txt GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs cmd.exe File created C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat GOLAYA-SEXY.exe File created C:\Program Files (x86)\poddddkod_dap\novay\dooolina_op.ppp GOLAYA-SEXY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings GOLAYA-SEXY.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 536 wrote to memory of 4248 536 GOLAYA-SEXY.exe 79 PID 536 wrote to memory of 4248 536 GOLAYA-SEXY.exe 79 PID 536 wrote to memory of 4248 536 GOLAYA-SEXY.exe 79 PID 4248 wrote to memory of 4888 4248 cmd.exe 81 PID 4248 wrote to memory of 4888 4248 cmd.exe 81 PID 4248 wrote to memory of 4888 4248 cmd.exe 81 PID 536 wrote to memory of 4664 536 GOLAYA-SEXY.exe 82 PID 536 wrote to memory of 4664 536 GOLAYA-SEXY.exe 82 PID 536 wrote to memory of 4664 536 GOLAYA-SEXY.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs"3⤵
- Blocklisted process makes network request
PID:4888
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs"2⤵
- Drops file in Drivers directory
PID:4664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
594B
MD545f214b0559ba1bdadec2beebe20f608
SHA1902da8f35a5c6c9af3f94f4d9df77576d04638a8
SHA25609239da81b4484446aa5059786078132f1933dc6e013171b12f23117602bdf04
SHA512081a636ecf62e3b4412a51dbf82a829612b4209538444d31e0f4572207d04262930c3f0ff3abbde4ad6811c354cf97866201b51d18c9b6809e23b68bdabbcd25
-
Filesize
61B
MD5f646791f751efff33b23461174826845
SHA10bbcec47b55640be32ffab3a093883a401ba7764
SHA2563c5492e6bbc49833d6252b53540140e0af85c8529c98ea2ab62df7646767aec6
SHA512b4da3f099be3bade7c3c6757993a55af0a66329f8d4ab132386130f69413c71867a4454ce02627023c417fa443d76c990a1999bd0d4f301de04af7603a4fdf60
-
Filesize
1KB
MD549948124563c73e095c5c54f00e03b96
SHA1779cfbe4b5a74af0049fb0d5eb55e756b2f78127
SHA25656b00d7528b54a7a9604ff3a8a20ec7a5336e783fc7ae6625374e4304406b518
SHA5127d4e4ece566f760b41c256a0b82d393a14f849e41119a1b84417b7255685b70f72149fae4d43ad101557a201f7b8482f524392f53c0d7f2fb15af8ab5aae2f09
-
Filesize
249B
MD5f2af09717b1aa23eccb54c15d645a18f
SHA1c2f81426f45e73c9367d7be8473ad27acc3a58e4
SHA25683ee369a5ab57b016c08919541455bb5e6f17fc27f76a2f70ca5359b8fa7eced
SHA512fceb7d777c866c71a85f6b68f9863791a49eab59a1eb277338df293fa0d6f11af1d94bee6c876f62d8b7872eb06428cdd14b01135a16ab9260d2fbbd24270338
-
Filesize
249B
MD5f2af09717b1aa23eccb54c15d645a18f
SHA1c2f81426f45e73c9367d7be8473ad27acc3a58e4
SHA25683ee369a5ab57b016c08919541455bb5e6f17fc27f76a2f70ca5359b8fa7eced
SHA512fceb7d777c866c71a85f6b68f9863791a49eab59a1eb277338df293fa0d6f11af1d94bee6c876f62d8b7872eb06428cdd14b01135a16ab9260d2fbbd24270338
-
Filesize
1KB
MD5776b152fc7b16cdb6f03b535016b30d7
SHA1535c5c292c16acda59325c59c1327dfe39499334
SHA256802d784cf685137a021b5a2c86d32e755ddde8212de5d320f1c4cd97feff735b
SHA512fbcd9e8283b69170bdee143111a26e22778bf792b5bb0e00db524b087008b23a2fdca3c772b3cb1631914772e91699cffe7a45023e717c204f30e99f67759090