Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231215-en
General
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
238KB
-
MD5
e0dc7a4c82c9bffab032065a62bc4989
-
SHA1
4c8ee314865e3c675e9ee87c028b8787ff293d97
-
SHA256
df2e738b57c80542a302150d46efaf0d94cac05ff102ccf71975bffab3b2a845
-
SHA512
3a99a2960697d88d20cf09c97cccb7076c475a718e715c6c384c501e49533da95eaec04aa25b559829393e81b847fc6473e6601969bebfb8a8a889711d9e0faa
-
SSDEEP
3072:rBAp5XhKpN4eOyVTGfhEClj8jTk+0hqbPBxjCPf+Cgw5CKHq:WbXE9OiTGfhEClq9H5kuJJUq
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts backgroundTaskHost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation GOLAYA-DEVOCHKA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\Tocausetofallby.vbs backgroundTaskHost.exe File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\when_we_a_fill_the_power.bat GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\everybody_lie_life_is_life.gol GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\Tocausetofallby.striking GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\Uninstall.exe GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\Uninstall.ini GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\when_we_a_fill_the_power.bat GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\everybody_lie_life_is_life.gol GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\Tocausetofallby.striking GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\Tocausetofallby.vbs backgroundTaskHost.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\lethala fell blowsinisterby somefell.chanc GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\ustanovi menya plllll\life is life\lethala fell blowsinisterby somefell.chanc GOLAYA-DEVOCHKA.exe File created C:\Program Files (x86)\ustanovi menya plllll\life is life\Uninstall.exe GOLAYA-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 3860 968 GOLAYA-DEVOCHKA.exe 106 PID 968 wrote to memory of 3860 968 GOLAYA-DEVOCHKA.exe 106 PID 968 wrote to memory of 3860 968 GOLAYA-DEVOCHKA.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\ustanovi menya plllll\life is life\when_we_a_fill_the_power.bat" "2⤵PID:3860
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\ustanovi menya plllll\life is life\Tocausetofallby.vbs"2⤵PID:2204
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d5c076efab21915890b60103ba4dea62
SHA16104aec036a1d35a73bc96a15cd710b7b94cc017
SHA25606cd19654663204db930b866e06df3c7745beac1480e8f171944c5ca6570a6eb
SHA51251540e75df6682b1b664933b2f71adc211a42ef0bf821999bd1c23f7eaf9c88dfc56965046ecac1f9d00aecc854ed2a9c9a78be0e8a5167733eebd152911e2f9
-
Filesize
112B
MD5a97805a7dcdf57804ebce37d2599a681
SHA199cfacb04b6bbe087d6c46e3d920ba9ab0a4f056
SHA2560c6fa09a4144b4313cd2a859b98b622f836c1ea311d84aca4dcd25f706d35039
SHA512dca01920001d10435669e51f2ba65159e9997bc0e4a3f12e0b52b66061e402194d01ac8cfd74c53499cdf59aa9f6adf3fa0e5e73b6ef1d4c0e8a5bc9955ab1c9
-
Filesize
1KB
MD5e819314328e0c47a39b66f0bf114cd98
SHA16dac75be2070f88880815da7c2a9c42fdc574d2b
SHA256485fd37cae37024811d76da56012ae72625d74681e714493176aca7970a4611c
SHA51214819cf355ac637fea3bc39a342c781376e18963e038fb72c3f4aa4e6444fc64e85d4529c6e9f90b4581154df22c7554887c63e5dceeb66ca950f779d0eb5790
-
Filesize
1KB
MD54fccb4d0b47dfce4da0002ee30fc74e6
SHA1e5e9311650e7631800cd404d2aa7df00e4b169d3
SHA2562554b9fc2dd8cdb75ac6e3650a9b5fe0b90d40a7bb04625b021aaf6d0e1a1499
SHA512951e1f0a5636052f32b7990201cc1d855d8bef07fd247fe95f87dfc20c314c3945fecb549e402445543fadd60c5c46db4d028391a690c84bd6a8308d335adacd