Analysis
-
max time kernel
216s -
max time network
342s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20221111-en
General
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
239KB
-
MD5
344c41e9c9c76f452ba8186ab4f00fc1
-
SHA1
0860a4a631e8a964d0fea59f43d202716a78373a
-
SHA256
3827960d6852577932ca51d05127924083a4f98505f59676b21a6aea45c67d6f
-
SHA512
9459fa424ec2a52f93993cf56cb984364c10798ef67e58d4efc868966904ac8bf42e37054c4237e1e9ecc4579a24ee9ad360a0a666ce944e0b768177f385730b
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0hMg6X2JHBM6yJMMvyR+Cgw5CKH2:+bXE9OiTGfhEClq9fgMbnMMjJJU2
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1792 WScript.exe 5 1792 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\10101010101010101010101010100101010101011010.la GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\exolot_v_rot_kompot.ggg GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\Uninstall.ini GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.vbs cmd.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\exolot_v_rot_kompot.vbs cmd.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\lap_lap-kol_pois_oaloa.fok GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.gggog GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\10101010101010101010101010100101010101011010.la GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\Uninstall.exe GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\exolot_v_rot_kompot.vbs cmd.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\lap_lap-kol_pois_oaloa.fok GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\put_ya_flower_to_unita.bat GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\put_ya_flower_to_unita.bat GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.gggog GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\loksjin serdchema\nedorosti samim\exolot_v_rot_kompot.ggg GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\Uninstall.exe GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 692 wrote to memory of 1164 692 GOLAYA-RUSSKAYA.exe 28 PID 692 wrote to memory of 1164 692 GOLAYA-RUSSKAYA.exe 28 PID 692 wrote to memory of 1164 692 GOLAYA-RUSSKAYA.exe 28 PID 692 wrote to memory of 1164 692 GOLAYA-RUSSKAYA.exe 28 PID 692 wrote to memory of 576 692 GOLAYA-RUSSKAYA.exe 30 PID 692 wrote to memory of 576 692 GOLAYA-RUSSKAYA.exe 30 PID 692 wrote to memory of 576 692 GOLAYA-RUSSKAYA.exe 30 PID 692 wrote to memory of 576 692 GOLAYA-RUSSKAYA.exe 30 PID 692 wrote to memory of 1792 692 GOLAYA-RUSSKAYA.exe 31 PID 692 wrote to memory of 1792 692 GOLAYA-RUSSKAYA.exe 31 PID 692 wrote to memory of 1792 692 GOLAYA-RUSSKAYA.exe 31 PID 692 wrote to memory of 1792 692 GOLAYA-RUSSKAYA.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\loksjin serdchema\nedorosti samim\put_ya_flower_to_unita.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:1164
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.vbs"2⤵
- Drops file in Drivers directory
PID:576
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\loksjin serdchema\nedorosti samim\exolot_v_rot_kompot.vbs"2⤵
- Blocklisted process makes network request
PID:1792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
683B
MD5e1883f4bf7e368da53d5e2225e3a1f78
SHA1b02a87d4a7b5438357f547cabb520e4ff6581328
SHA2560c2feec4a22d34a39ecce8d311bf1170e66a3b34b6f2ae846bc43049a44abd2f
SHA5120576ffa3ae4e9f18d473fcc642ce75d69ba877cb488651409376231109cd8096fe8bbc7f09f7850cddb72795f76cde4b2335e40d5060f6d8f2af6f2d17064797
-
Filesize
683B
MD5e1883f4bf7e368da53d5e2225e3a1f78
SHA1b02a87d4a7b5438357f547cabb520e4ff6581328
SHA2560c2feec4a22d34a39ecce8d311bf1170e66a3b34b6f2ae846bc43049a44abd2f
SHA5120576ffa3ae4e9f18d473fcc642ce75d69ba877cb488651409376231109cd8096fe8bbc7f09f7850cddb72795f76cde4b2335e40d5060f6d8f2af6f2d17064797
-
Filesize
120B
MD55f43cc09c2448d238b467d4902a01394
SHA14f82c81a46d1df708493004aa8552d4df2740e57
SHA25624dafc098a82c1b30a66d05124610097ed4673a43121744eb35e9f578955ed6f
SHA51205b571e6c6038ded7a360c35902405dbaa81007d2b4eca612975775c14abb61c9c54d2ab3a0fe5c3c0fdddfc212673c5a80bdb69211d1020c9acf79b1603f7c3
-
Filesize
1KB
MD56c58788b3088787f7626868b1bcb77e3
SHA1849c11036d006d15ab2b47b2004c94098e30c28b
SHA2561b07297cac8a30f9d4fc7ff5d9bf458d23ff8dd976c8e03d193c32872bf7d054
SHA5129972ed5669e524a6791b4ef9b56fa9c68ef03248c5a20b4f50ab837aeee0869c7d4553e504b215118b942d94b3fbf9a242843fca8c6cb5baa2bece60d56ed983
-
C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.gggog
Filesize793B
MD51575a7d9f3f847c981c8347c1515b8bd
SHA1926e95bbb96dbdd5a81bb6a076d5071a9cd59cf5
SHA2561e5739a31bbad29167afe32e3e064a57d47514b0df50cdd06149454bdd54b6f2
SHA51225e9c7daa104f043bb763304ab6ce81391a9b0f39411addb387aef6703ed8dac2d35037340c9ff17dd8c50ae16e4f54da938bbc920f8c8fa367c7bd373c382b2
-
C:\Program Files (x86)\loksjin serdchema\nedorosti samim\skolidbfwbfngpxvbbo3ignbglsnflhlsbsvgkblebrhbkfb.vbs
Filesize793B
MD51575a7d9f3f847c981c8347c1515b8bd
SHA1926e95bbb96dbdd5a81bb6a076d5071a9cd59cf5
SHA2561e5739a31bbad29167afe32e3e064a57d47514b0df50cdd06149454bdd54b6f2
SHA51225e9c7daa104f043bb763304ab6ce81391a9b0f39411addb387aef6703ed8dac2d35037340c9ff17dd8c50ae16e4f54da938bbc920f8c8fa367c7bd373c382b2
-
Filesize
1KB
MD5e756b71be76cd80a2dc3ae04deb9a309
SHA17cc93e6c927aa0bd1c83e5696e6195562ed27525
SHA2564751e738816cbeae753aff68419fefd0817d6969b60db28b94d3de743abc20e7
SHA5128db0b9f09ad3e16c1eddc900d0c75fdf447044fdaceefc44e778bc38dc62289fd0e134dd40453f0b9911a14c423cb92c3b6ef28bc16a66cd3aaa7ddab9b3a1a5