Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
GOLAYA-BABE.exe
-
Size
181KB
-
MD5
3f0da76b4c682e86aeb9a8a425eaa903
-
SHA1
650b36332381beac233426a3fb4bfeaca92a1296
-
SHA256
ffa647bd5ec34f2f982bd2695abf1be734d323b66617c9e7f8bdaed49832ec6e
-
SHA512
29010590d712e329c322430340c3cd28c88d7242fefebe0f404c04f7eb703351b27c5faf01771259bb768c1ed7d14cf1730f626a372754d6579b91656bdc4c92
-
SSDEEP
3072:YBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+iG+v5y1rF0t8:PbXE9OiTGfhEClq9iktFb
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\OnmywaytoHamburg.bat GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\all.vbs GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\planningandinforma.tion GOLAYA-BABE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1656 3044 GOLAYA-BABE.exe 19 PID 3044 wrote to memory of 1656 3044 GOLAYA-BABE.exe 19 PID 3044 wrote to memory of 1656 3044 GOLAYA-BABE.exe 19 PID 3044 wrote to memory of 1656 3044 GOLAYA-BABE.exe 19 PID 3044 wrote to memory of 2712 3044 GOLAYA-BABE.exe 18 PID 3044 wrote to memory of 2712 3044 GOLAYA-BABE.exe 18 PID 3044 wrote to memory of 2712 3044 GOLAYA-BABE.exe 18 PID 3044 wrote to memory of 2712 3044 GOLAYA-BABE.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\all.vbs"2⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\OnmywaytoHamburg.bat" "2⤵
- Drops file in Drivers directory
PID:1656
-