Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:29
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-DEVOCHKA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-DEVOCHKA.exe
Resource
win10v2004-20231222-en
General
-
Target
GOLAYA-DEVOCHKA.exe
-
Size
149KB
-
MD5
ccca394b1369e766c53346550b481c57
-
SHA1
47dccd3fc9b7bf7c98f75fa11725089d5a977b4c
-
SHA256
211901e1229d7b816754146ff8d7167e8a92211afe63dc44eb8056d0b054a12a
-
SHA512
98625c9dd7cc8b57609ce20f6f295dc8704a75b49cde806ddbbb040cf3832028425bed0cd0da0c501508fabd2cdc59cd1717fa948362281848ed4ba798990712
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hisUwxgTpLnNq:AbXE9OiTGfhEClq9TwxgJn0
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2460 WScript.exe 7 2460 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\salst\ogurets\Uninstall.ini GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\polenolll.pof GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\all3.vbs GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\lit.vbs GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\122.txt GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\Uninstall.exe GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\podkati.bat GOLAYA-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\stuckja.jol GOLAYA-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2684 1888 GOLAYA-DEVOCHKA.exe 28 PID 1888 wrote to memory of 2684 1888 GOLAYA-DEVOCHKA.exe 28 PID 1888 wrote to memory of 2684 1888 GOLAYA-DEVOCHKA.exe 28 PID 1888 wrote to memory of 2684 1888 GOLAYA-DEVOCHKA.exe 28 PID 2684 wrote to memory of 2460 2684 cmd.exe 30 PID 2684 wrote to memory of 2460 2684 cmd.exe 30 PID 2684 wrote to memory of 2460 2684 cmd.exe 30 PID 2684 wrote to memory of 2460 2684 cmd.exe 30 PID 1888 wrote to memory of 2544 1888 GOLAYA-DEVOCHKA.exe 31 PID 1888 wrote to memory of 2544 1888 GOLAYA-DEVOCHKA.exe 31 PID 1888 wrote to memory of 2544 1888 GOLAYA-DEVOCHKA.exe 31 PID 1888 wrote to memory of 2544 1888 GOLAYA-DEVOCHKA.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-DEVOCHKA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\salst\ogurets\podkati.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\all3.vbs"3⤵
- Blocklisted process makes network request
PID:2460
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs"2⤵
- Drops file in Drivers directory
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD5559c8ec72bf701870603c0f79907234c
SHA1f3a809dee961f1f3d6c5c384596504981273fd77
SHA25651611da1f1bedbfc97fa015b41bc5e5ebfe61b8eb2aca050d440c642dd0c41c6
SHA5126616f4ac087e1b9e6f1bff0e5d844e316cddd5a2409e97b88118410475ab1bb544d59d6006940f74cad176470bc58112608d2b7bc01e71f0b232c6cdfa551a6a
-
Filesize
826B
MD5b0350182dcd735cf07e9c501cff5e7a1
SHA16dc80006d0d6e0e1d136826ab0e2a6c9bc61b950
SHA2569659ca4ab0f584f9f3bbb5135eb0d12ebc3d24cbbdc719c7d7338f59d401f410
SHA5123ba96b3082f3a98a3adc452d1f52284bd49b2d035f0fbe960738324b624b8e2a70254bbed7a7f0d29ff6f5cd756f01f29d3fbba75419d9ed652879cdf79312ea
-
Filesize
3KB
MD5a131962527d3b919e7c23267a2b0cdc4
SHA1e7d2e84d765b7c2011bb91c78c93da33227dcfc8
SHA25672375ee539442bf129b7ad6c3dbc68728b16a2106cef403000f26a833dd12322
SHA512cfd69e3b434c9b4262b929b02e7616151f2960df56cc632f8c0e4d6e3a2f724c34db7d71e1bc984bccd9cc0a39a77e6da86cc4d675c2af0d3ae09bf981694cbc
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
64B
MD561391af0a6e3c8f6d08b46b623eb3c2e
SHA1ffe8b74b2c5920b13fabd2f203ab2c6171be663a
SHA256d0a90a49e36d502e4903b5062712bca9006ae0afd349d4e9a74789eb68189685
SHA512f98bbbb3602936619714dcf787c3589948291e6e7a0c69f404e8b636a3c7ce608ac400b589b828f31270c550ef28f8a741fc40d8d018e28f0fe4512d50140180
-
Filesize
1KB
MD544ccd2e0f82c735fbef30c341d6bfc10
SHA18cc305f7f8fff401380175ae0cc7d0df99b83373
SHA256d29b19381fbf3494195232c63a36e6a9d38de4e2db3e80ae3f007a36e9674db3
SHA5128627b9c13415f5d9c917692281f2a33aa4286f0a50b0d08933ca663cd6cc12fb17256a2270ff283dd497661001b6c06f3d16e889215821659fa24ede367dfe07