Analysis
-
max time kernel
57s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 01:36
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20220812-en
General
-
Target
GOLAYA-TOPLESS.exe
-
Size
237KB
-
MD5
5c94059adb47691be3bd70b628224d42
-
SHA1
2173a63636142956ac0f2032caf3c327f27dd4cc
-
SHA256
5159ded8a0a546ebbed689e870873c7cea047be40d6311cc475d3ca5cedfcd52
-
SHA512
dd9178ee54765bf7c002889ff700516b77c5297e446f284a2f36768325cd5dd531878d1c07fe013024e92c001f9450fb349b26b0608426dda12a7d9f62f74701
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0h5Y2AGeS/+Cgw5CKHS:JbXE9OiTGfhEClq9AY2AGe/JJUS
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 920 WScript.exe 6 920 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\dooolina_op.ppp GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs cmd.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\1.txt GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.oui GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.exe GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\dooolina_op.ppp GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.exe GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs cmd.exe File created C:\Program Files (x86)\poddddkod_dap\novay\1.txt GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.oui GOLAYA-TOPLESS.exe File created C:\Program Files (x86)\poddddkod_dap\novay\Uninstall.ini GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat GOLAYA-TOPLESS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1232 1380 GOLAYA-TOPLESS.exe 27 PID 1380 wrote to memory of 1232 1380 GOLAYA-TOPLESS.exe 27 PID 1380 wrote to memory of 1232 1380 GOLAYA-TOPLESS.exe 27 PID 1380 wrote to memory of 1232 1380 GOLAYA-TOPLESS.exe 27 PID 1232 wrote to memory of 920 1232 cmd.exe 29 PID 1232 wrote to memory of 920 1232 cmd.exe 29 PID 1232 wrote to memory of 920 1232 cmd.exe 29 PID 1232 wrote to memory of 920 1232 cmd.exe 29 PID 1380 wrote to memory of 668 1380 GOLAYA-TOPLESS.exe 30 PID 1380 wrote to memory of 668 1380 GOLAYA-TOPLESS.exe 30 PID 1380 wrote to memory of 668 1380 GOLAYA-TOPLESS.exe 30 PID 1380 wrote to memory of 668 1380 GOLAYA-TOPLESS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\poddddkod_dap\novay\looopodokopo.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkod_dap\novay\slonopotamus.vbs"3⤵
- Blocklisted process makes network request
PID:920
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\poddddkod_dap\novay\boiii_ffffpo.vbs"2⤵
- Drops file in Drivers directory
PID:668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
597B
MD514b7a456d0f0e6687042375f36291c2a
SHA13d88d8475406fa2d004f9588524b289d3359f795
SHA2560f4a15ce097fd7c24d13837b181d2e222a1ff5574fbcc8bac890047186d8725d
SHA51241fec515cd4cbebaedb97a5eecea24b5bb00feae30c5e1c7ea01000afec2626cdd63c3197def7d68dba591cc4efb30fa7b203f46483738d969eaca961beda031
-
Filesize
65B
MD57cb8698f0d38b859c2162d8d4012e91e
SHA10936d45df25ae05a6a47404ebfa04f10758b158f
SHA256b9f7186bbcb607a8f0870abc34c4900ed94e94593dba0b4446dd65b516d21545
SHA5125e14a31aeedf67a4cb95ec88d5f79498e4e101a9ca7f1a032c762a674214f20c98fd9427471a5541464efd2a53618257ceea2426ac7a6a0f76c728d3597f805b
-
Filesize
1KB
MD5dfe49fa05ee03d982c71a69f2407b2cb
SHA1a76fe7187f26d05e2e3b153aad4e181baf0a65da
SHA2562fdcf51105495fbca8ee4e73f446622feedde33851ed2cb6eb891577c78fff92
SHA512a8b1be902a469959be4ab84866beb868363eaef5a7ccb7d3cdf1dae10a9574e55960e1813430902043c8900f5e4026d710a1610eceeff40ec4dc5b30e4fc943e
-
Filesize
255B
MD5bdc969e3d207e323222b4b5e5f0728ae
SHA15150df263f3a05a7ffa853bf0a6b2f9b8bbd6d79
SHA2560cb7945b915222abe5886b7d2036ee76bc7093f51fc18b795f1c600837bd5f5d
SHA512d97f7a7f96e14ca2b0940cbd8007a9a23dc54f8d6fca512b7ce713f8aa97c0d471c351a33ae7027ccd2ec308ff4ef6f2c14171774faacac8af170cb55fc75ee6
-
Filesize
255B
MD5bdc969e3d207e323222b4b5e5f0728ae
SHA15150df263f3a05a7ffa853bf0a6b2f9b8bbd6d79
SHA2560cb7945b915222abe5886b7d2036ee76bc7093f51fc18b795f1c600837bd5f5d
SHA512d97f7a7f96e14ca2b0940cbd8007a9a23dc54f8d6fca512b7ce713f8aa97c0d471c351a33ae7027ccd2ec308ff4ef6f2c14171774faacac8af170cb55fc75ee6
-
Filesize
1KB
MD5776b152fc7b16cdb6f03b535016b30d7
SHA1535c5c292c16acda59325c59c1327dfe39499334
SHA256802d784cf685137a021b5a2c86d32e755ddde8212de5d320f1c4cd97feff735b
SHA512fbcd9e8283b69170bdee143111a26e22778bf792b5bb0e00db524b087008b23a2fdca3c772b3cb1631914772e91699cffe7a45023e717c204f30e99f67759090