Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
General
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
181KB
-
MD5
b1d337c0c73cbea038b997d6abaddb31
-
SHA1
4f4d45e58de9ee50b01e53846143427d942268ef
-
SHA256
3fd1978f95b6bc6efab67e2b2b98b0c373cccc10757457f7735dc3b2a4f29720
-
SHA512
3c25bd65e87fa431ab7ade6c61bbf825b18633d7bee97ca8061ae4d0f68c9715d14e6f411d83471daaab0a0f93927f90d3bfb93a5abacfce0cda342807a6c573
-
SSDEEP
3072:rBAp5XhKpN4eOyVTGfhEClj8jTk+0hR4udk4Rjb+o:WbXE9OiTGfhEClq9Xuvjbz
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 2236 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation GOLAYA-RUSSKAYA.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\planningandinforma.tion GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\OnmywaytoHamburg.bat GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\all.vbs GOLAYA-RUSSKAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings GOLAYA-RUSSKAYA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2620 2220 GOLAYA-RUSSKAYA.exe 93 PID 2220 wrote to memory of 2620 2220 GOLAYA-RUSSKAYA.exe 93 PID 2220 wrote to memory of 2620 2220 GOLAYA-RUSSKAYA.exe 93 PID 2220 wrote to memory of 2236 2220 GOLAYA-RUSSKAYA.exe 95 PID 2220 wrote to memory of 2236 2220 GOLAYA-RUSSKAYA.exe 95 PID 2220 wrote to memory of 2236 2220 GOLAYA-RUSSKAYA.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\OnmywaytoHamburg.bat" "2⤵
- Drops file in Drivers directory
PID:2620
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\all.vbs"2⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\OnmywaytoHamburg.bat
Filesize2KB
MD522ded7b6d88931639d5ec17f63ded2ec
SHA1ef89258c3117d590a97ae89dc9a6a17406983018
SHA256d400f954435e7d1d5fb092ae6e56e1a7902ba40103cf617057564aeab22fd380
SHA5121b25ea6621f58049110a9a8e193a60b559670e876d92a96d389e11ee5ba3c42575749592e9764e15d297a13d6ed9b08199fc565e47053963267de9a56f07dd4b
-
Filesize
911B
MD57d030cb549eadb46787e774b7d2349ea
SHA10ce746e7a1e8ce96250a6c9764aae24d20b8fe43
SHA256f3fed63e84e70ca80081e4cf165b2d28c8088524c6b67a35c361834fecac59e5
SHA5120798d7646a9bdeb70274c075d1c88cf60db6c09b8331df07a7fa40530b4c9538a77ce6d05abaa9d562ba6112dd22667baf9fbb6a9dc8641eb413b0667af9b8d5
-
C:\Program Files (x86)\power inverters, radar\Tourism Whistler offers comprehensive\planningandinforma.tion
Filesize74B
MD596121bfd46615e1d80c6d3152b79b2b1
SHA173f39abe1ddf9ea28656f2d1454ff6e5df357719
SHA256aa6f7ca0b17424562d0926160849fe0a4dcee46f46254ac2cd90fc529ca0cd6a
SHA5123dae396d5c336006ac0be6362e16f66b9f771c14b115461b7a76f71de181cfc80a2983664ebc5ad6fac44e4702f1a0dbf98b774f7bc884a7dff5617755d821f2
-
Filesize
1KB
MD5c0805e6fff9d30c65b91bc9284beac8e
SHA145456e27d6632159ed7e4403caa1a16721c3b603
SHA25653f25ec3705be321e5d7c17acc6ea1aba6aae01e99223f97d97bcf288c5a8228
SHA51234648a026528d9746f73d01f7600bf947fdee00ddf8525cb89338ebd9b51789f968a79b4c1671eeb96ac83f21788167980835cae8c0f86a550ff95bddfa3c2c3