Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
180KB
-
MD5
36811975c8783184baa4c6b52e9ef020
-
SHA1
d58d15a044498dd031c0dbd0df2d1b11dda68375
-
SHA256
676e6244d7bb1fe69ab533cbad20f3c0cc57f951041d81d91e445fd726ff57f6
-
SHA512
c9777f95b32240bb8bec608e28e4cbbea4a40233b5409ef6bd508b5f91df8bfd512315db54c642a4807fed0c38ee629f704a10b0d1aea2499a0092c7db381cd9
-
SSDEEP
3072:NBAp5XhKpN4eOyVTGfhEClj8jTk+0hfAWFmEeQqqqqqqqqo/9:IbXE9OiTGfhEClq9K9Q
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\upppploooooollll.ruu PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\09olbanid_go_stricktly.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\ne_nu_ne_zraza_li.vbs PHOTO-GOLAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2852 1756 PHOTO-GOLAYA.exe 22 PID 1756 wrote to memory of 2852 1756 PHOTO-GOLAYA.exe 22 PID 1756 wrote to memory of 2852 1756 PHOTO-GOLAYA.exe 22 PID 1756 wrote to memory of 2852 1756 PHOTO-GOLAYA.exe 22 PID 1756 wrote to memory of 1476 1756 PHOTO-GOLAYA.exe 24 PID 1756 wrote to memory of 1476 1756 PHOTO-GOLAYA.exe 24 PID 1756 wrote to memory of 1476 1756 PHOTO-GOLAYA.exe 24 PID 1756 wrote to memory of 1476 1756 PHOTO-GOLAYA.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\09olbanid_go_stricktly.bat" "2⤵
- Drops file in Drivers directory
PID:2852
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\ne_nu_ne_zraza_li.vbs"2⤵
- Drops file in Drivers directory
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57b76036fd9fd26034df1e48eaafbb352
SHA1903df1e0369636ffd1cd4db53c14c0038f751d1f
SHA256d86928bc527c52b2f566cd8bd945cb99770bfd0bd079d08ec1470afcbe4801bc
SHA512fb5dcf7ce6eae15b9994dc44da0eab6f1cab9b8130ee6f9ec0469c30b348761820ad9952390a6f0db79b9f3d86546f99d2e81fc6c630a8177e8e1a87d457b62d
-
Filesize
1019B
MD5379185364318d34f8fec95c036a02994
SHA1712f947fd2aebb8604611af285fcd44e0d4bf140
SHA2567cbd992a20c513686acb44fe64ad67ab3ce9cf32b5096660eec6f7803c4d5c9d
SHA5125edef20f0685fbd687783db30a85fc31fc800c5c2f479b392f31a3ff9092e123470f8c3e489cecc6254d199f6bf4d84bd3765a201012cbad54c038421877c5e2
-
Filesize
74B
MD523809deed7e58abec9809b2d302cbcb2
SHA1208e50a43ac7c7a3a99d65d690aa73b50eecc9f7
SHA2560ae8ad7ab27947636ae02d0c65e5a49d640fb91c76d347c0daad28a823862dc6
SHA512c2c7ae2b4274fb45a805ce80e3f1f8a2db31b492a408123d30a047e144ca250278d80c8082fe9762c3315ebf159a0d4465efa469adc5c38ab6dfdf6bfa302751
-
Filesize
1KB
MD525ee27baa31c59fdf6cf5d18955ef985
SHA151d4725afa6d997cb7347c60a7d17485a8fb2ea7
SHA25675daf3b3c78bc2038351bee72d6036edf869f7106da7366722b1cd03f26f195d
SHA5128a4e1f971b8158db5df7b24b8f0d317d2397209c21ab07c6e6014bc767bbc95e32093fb59e2e67369687c9ed024ff6d354652d02424a8050500a410369abe12e