Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 14:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
GOLAYA-BABE.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
GOLAYA-BABE.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
GOLAYA-BABE.exe
-
Size
180KB
-
MD5
f28c1e58c5766a111297588e8ab02361
-
SHA1
3d55a55fd6d193d32742fe89bf6041f9182ee447
-
SHA256
6e239da433517b0856f91d212baebdf1963d80ba6c546a440da19121580818ca
-
SHA512
e09add020c39a8fa5b14f094679daa9d0645f4c0fe39a33194e9c4c3cdadee05986904084387437203387d97be4381c9714e47451aff01e6a7e6fcb5ec9797fd
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0hL/eSZZvLf6CNsPrXJ8WYQKaLba:JbXE9OiTGfhEClq90GSZZvLCCNsPrXJa
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2812 WScript.exe 5 2812 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\nasri_v_moi_rot.govno GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\chilli_v_zope\04en_cheshetsa_pizdets.bat GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ez_i_baldei_po_polnoi.vbs GOLAYA-BABE.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ne_zabud_hoppersi.vbs GOLAYA-BABE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2068 2168 GOLAYA-BABE.exe 22 PID 2168 wrote to memory of 2068 2168 GOLAYA-BABE.exe 22 PID 2168 wrote to memory of 2068 2168 GOLAYA-BABE.exe 22 PID 2168 wrote to memory of 2068 2168 GOLAYA-BABE.exe 22 PID 2168 wrote to memory of 2664 2168 GOLAYA-BABE.exe 19 PID 2168 wrote to memory of 2664 2168 GOLAYA-BABE.exe 19 PID 2168 wrote to memory of 2664 2168 GOLAYA-BABE.exe 19 PID 2168 wrote to memory of 2664 2168 GOLAYA-BABE.exe 19 PID 2168 wrote to memory of 2812 2168 GOLAYA-BABE.exe 18 PID 2168 wrote to memory of 2812 2168 GOLAYA-BABE.exe 18 PID 2168 wrote to memory of 2812 2168 GOLAYA-BABE.exe 18 PID 2168 wrote to memory of 2812 2168 GOLAYA-BABE.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-BABE.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ne_zabud_hoppersi.vbs"2⤵
- Blocklisted process makes network request
PID:2812
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ez_i_baldei_po_polnoi.vbs"2⤵
- Drops file in Drivers directory
PID:2664
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\chilli_v_zope\04en_cheshetsa_pizdets.bat" "2⤵
- Drops file in Drivers directory
PID:2068
-