Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:17

General

  • Target

    PHOTO-GOLAYA.exe

  • Size

    180KB

  • MD5

    36811975c8783184baa4c6b52e9ef020

  • SHA1

    d58d15a044498dd031c0dbd0df2d1b11dda68375

  • SHA256

    676e6244d7bb1fe69ab533cbad20f3c0cc57f951041d81d91e445fd726ff57f6

  • SHA512

    c9777f95b32240bb8bec608e28e4cbbea4a40233b5409ef6bd508b5f91df8bfd512315db54c642a4807fed0c38ee629f704a10b0d1aea2499a0092c7db381cd9

  • SSDEEP

    3072:NBAp5XhKpN4eOyVTGfhEClj8jTk+0hfAWFmEeQqqqqqqqqo/9:IbXE9OiTGfhEClq9K9Q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe
    "C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\09olbanid_go_stricktly.bat" "
      2⤵
      • Drops file in Drivers directory
      PID:4844
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\ne_nu_ne_zraza_li.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops file in Drivers directory
      PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\09olbanid_go_stricktly.bat

    Filesize

    2KB

    MD5

    ff158c15f177efebe146977c26504ba5

    SHA1

    2e44cb95acb48b7fabacf070367a855fadeadd5b

    SHA256

    1c4f5f92ec2d3eaf82dff3d8aa5921b60db5d972f80a18be07c9edbffa99f800

    SHA512

    2a07420462891cb70584b212ced9168311521f4303a11017f81c491f3f321ba7265d9b78ea5582b4a37abc3a6e84965a2a93a7374adf25e046abde36738db76c

  • C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\ne_nu_ne_zraza_li.vbs

    Filesize

    1019B

    MD5

    379185364318d34f8fec95c036a02994

    SHA1

    712f947fd2aebb8604611af285fcd44e0d4bf140

    SHA256

    7cbd992a20c513686acb44fe64ad67ab3ce9cf32b5096660eec6f7803c4d5c9d

    SHA512

    5edef20f0685fbd687783db30a85fc31fc800c5c2f479b392f31a3ff9092e123470f8c3e489cecc6254d199f6bf4d84bd3765a201012cbad54c038421877c5e2

  • C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers\upppploooooollll.ruu

    Filesize

    74B

    MD5

    23809deed7e58abec9809b2d302cbcb2

    SHA1

    208e50a43ac7c7a3a99d65d690aa73b50eecc9f7

    SHA256

    0ae8ad7ab27947636ae02d0c65e5a49d640fb91c76d347c0daad28a823862dc6

    SHA512

    c2c7ae2b4274fb45a805ce80e3f1f8a2db31b492a408123d30a047e144ca250278d80c8082fe9762c3315ebf159a0d4465efa469adc5c38ab6dfdf6bfa302751

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    c0805e6fff9d30c65b91bc9284beac8e

    SHA1

    45456e27d6632159ed7e4403caa1a16721c3b603

    SHA256

    53f25ec3705be321e5d7c17acc6ea1aba6aae01e99223f97d97bcf288c5a8228

    SHA512

    34648a026528d9746f73d01f7600bf947fdee00ddf8525cb89338ebd9b51789f968a79b4c1671eeb96ac83f21788167980835cae8c0f86a550ff95bddfa3c2c3

  • memory/868-37-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/868-40-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB