Analysis

  • max time kernel
    57s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 16:48

General

  • Target

    GOLAYA-DEVOCHKA.exe

  • Size

    238KB

  • MD5

    a66f1eff17dda44a3287ea082faa5bfa

  • SHA1

    fcb18b2525543cb892aca3ab5d1973b9319ec9aa

  • SHA256

    62889e736683cfdce0feca1622b0cc5e0fda07214a7e678768d8cc8d5e7396fb

  • SHA512

    56007cd2911948791c9f1b1e53c4da6925be75fc3acdd9bc54940a9775974245cd2973284205d71a98ae80958febe59fee323af0746ec393d987b957be7a78b3

  • SSDEEP

    6144:zbXE9OiTGfhEClq9rZXpdKw/F4qweYG3/jk8hqfFyBgRYGJJUm:/U9Xiuif

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe
    "C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\sri teplim kalom\singaraja eto les\fresh_meamings_cold_not_to_be_hero.bat" "
      2⤵
      • Drops file in Drivers directory
      • Drops file in Program Files directory
      PID:1204
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops file in Drivers directory
      PID:1964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\sri teplim kalom\singaraja eto les\fresh_meamings_cold_not_to_be_hero.bat

    Filesize

    1KB

    MD5

    6612e099d91656c947f3030b88efb273

    SHA1

    a083924f54dcca1d4fd1729a8dc766d7d43cf3d7

    SHA256

    4fd6525d3559532f0314cc6a00dada8109353e51aa02dd3e104ef83816b6dbff

    SHA512

    bec3fa4320a37e04b461103c603dcc2ab68ba110bc8deb8c3e3cd755b32607d0ae607b2f8fcb37d1d2335d048e375e3149e7b3cc9a97fd079f0e64dcbf299783

  • C:\Program Files (x86)\sri teplim kalom\singaraja eto les\net_v_zizni_nehera_etogo_kak_ego_o_stastia.jog

    Filesize

    106B

    MD5

    74305d205702e48e96da6265224b456f

    SHA1

    387686c3598b5d9bb084f1597aeb3c1687b8b001

    SHA256

    afc5e57f3536cc17c46c377efe3746f80079b1917597bb3430298ddb570a3faf

    SHA512

    67fb29190052df27d2a5166a9de5233b64037aac5d00cb31c986850bfcb91f6df8927aa76140dcb126cd8f82eb8dc6c5aaef87816ec5505f176ff62286fafdf0

  • C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.lll

    Filesize

    1KB

    MD5

    281ae60834732ad3cf3e209f8b858dba

    SHA1

    bd9a6596c9593054b0a4dc404a79a8e780c05e8a

    SHA256

    647e3a48644cf7cfed8d49b4f8faab8dfa8f6bc8c42d793d54e56e559445d9f7

    SHA512

    769d3b7ef96ec1d9e871cb57020239e07c45083b26e6940a5fc8dd95801bbecdd5f9ebf6399919e760d6dedee693c75ce33ae6d0b5728a1280920de45ed4f5aa

  • C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.vbs

    Filesize

    1KB

    MD5

    281ae60834732ad3cf3e209f8b858dba

    SHA1

    bd9a6596c9593054b0a4dc404a79a8e780c05e8a

    SHA256

    647e3a48644cf7cfed8d49b4f8faab8dfa8f6bc8c42d793d54e56e559445d9f7

    SHA512

    769d3b7ef96ec1d9e871cb57020239e07c45083b26e6940a5fc8dd95801bbecdd5f9ebf6399919e760d6dedee693c75ce33ae6d0b5728a1280920de45ed4f5aa

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    f2c5d10ad27bb489a71a16e71b70e8b4

    SHA1

    5154928e4445092cedd422c549817c7a50e59d76

    SHA256

    e085c03394954c9b369c0a6f8704062b3c6ab932208fe6061e7a5a5bac851428

    SHA512

    2f01c24aa2cc579b5d77c13a6b2af9f76738f7868c30a665ea0a4759d80032fbb451a1bbf406554223898a3c2ca586d4749a10b445823f28ef0585acbe57edf9

  • memory/852-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB