Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:30

General

  • Target

    GOLAYA-PHOTO.exe

  • Size

    149KB

  • MD5

    1a85fb803be48d4b605ebe3bfc4da62a

  • SHA1

    2aa2b1a0313ea2b0f93a42c5c68a3dfc34f3be6f

  • SHA256

    5b786fc82a774f220e3fc06b74a2f091d7aa30cdc84ed78851fdf1ea0932cb42

  • SHA512

    2691bb8c2dd3b1612e38db8e1bb9ef73576b59af19ae6191f9741bc75f34361205ed684f1ce6151c0f9787f3dea22683444d32f6d47bc721e2a2dd000ccb65ca

  • SSDEEP

    3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiWC23gO3EwUGPN:AbXE9OiTGfhEClq9F23gO0wUGl

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe
    "C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\Produc\New\nuashks.bat" "
      2⤵
      • Drops file in Drivers directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Produc\New\nadopilitsa.vbs"
        3⤵
        • Blocklisted process makes network request
        PID:2836
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Produc\New\samisok.vbs"
      2⤵
      • Drops file in Drivers directory
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Produc\New\nadopilitsa.nabazu

    Filesize

    269B

    MD5

    f8e76085c4bab58dcb161028c3aae9c9

    SHA1

    764af0a064b08e40beeab421df76d3c7fb389c75

    SHA256

    e7388abfc5e55e53c9a06f74e6000107b15641c3d99fe89d9f990584049b4ad6

    SHA512

    7c557fdee8163233be08a494955b02af789d37fefc5429b966079c83950f4b79ec50c7f521ba0cc72cb762c300ab96ce72c1bc90a3eca6eeed67e1a2614a8b61

  • C:\Program Files (x86)\Produc\New\nevedomaya.hernya

    Filesize

    48B

    MD5

    7215ed14e21d41517551593a906dfa9e

    SHA1

    572ec6424f46b19e5b1a0ebcb58df8efadaa37aa

    SHA256

    248f4f03a3bac68d3f2231e72dcdb82d16ba4a49631306e231200c36a4d7d6b6

    SHA512

    c81fcc628b6178017cacdbf7c57b5bd3304ea1e6a43b4c8164082f6d701f7f03c16d3026b011819ee76cb4609ca8c00e70566382cd839fba9fe714e1d0a1f7e5

  • C:\Program Files (x86)\Produc\New\nuashks.bat

    Filesize

    3KB

    MD5

    3e4c3d96bb56bf7fd6de66b193f86d04

    SHA1

    cf58adf14aa9cf5c4ebe270edd10910d88180bde

    SHA256

    e0eb677d3ad428b7760958924f2701654b40b6de1059aed2a94174ca5ec50214

    SHA512

    6037db447934cd702d7bfbbf0d918fccf54c341dae8a9148dc5f2cbf4226184d9b6eec47196a0ec98bb70dd78dcc1bcdc0c12c542c5e7459460d1c4cd99b563d

  • C:\Program Files (x86)\Produc\New\poppets.txt

    Filesize

    27B

    MD5

    213c0742081a9007c9093a01760f9f8c

    SHA1

    df53bb518c732df777b5ce19fc7c02dcb2f9d81b

    SHA256

    9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

    SHA512

    55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

  • C:\Program Files (x86)\Produc\New\samisok.vbs

    Filesize

    790B

    MD5

    a72404d8d2ce31b6373ae35bb11e9de2

    SHA1

    72bbc15ccb7823161482cc2997bd02ec212b9f4f

    SHA256

    3c9a8a034780f0a757c06db040a8342a3f9331f150ebab6144beee795fa01ae2

    SHA512

    29d871a39dc174f364ee4b04d34be54f4369178c2266ff62090866a428bc69c6b7f54ac10d2a48ef73d2d3b531966f6597be55ee3e9b25eb4746b4a0f884f900

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    44ccd2e0f82c735fbef30c341d6bfc10

    SHA1

    8cc305f7f8fff401380175ae0cc7d0df99b83373

    SHA256

    d29b19381fbf3494195232c63a36e6a9d38de4e2db3e80ae3f007a36e9674db3

    SHA512

    8627b9c13415f5d9c917692281f2a33aa4286f0a50b0d08933ca663cd6cc12fb17256a2270ff283dd497661001b6c06f3d16e889215821659fa24ede367dfe07

  • memory/3028-74-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB