Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231215-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
149KB
-
MD5
f5114a6a5fac2aaa5993724d1c87edb9
-
SHA1
2a280420019d46fda987f67277053fcf75907ae2
-
SHA256
546198362c7ad11031c368f55fb2a3dde1b373eabcf149381e231ce2acfd0725
-
SHA512
89b0a6d3f95851b42d7c80a681cfcaa8e948a5d8b494816cff2a7bfaec6900846e7f2b6eae567445176f2c61a9b1297bd7a7adbfdc2bcced222236f902f2dc66
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiiMYWeITf9i7ok6k:AbXE9OiTGfhEClq9OIxiX6k
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 48 1224 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation PHOTO-GOLAYA.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\koollapsa.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\slonik.po PHOTO-GOLAYA.exe File created C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\hhhh.txt PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\all2.vbs PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.pp PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe PHOTO-GOLAYA.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings PHOTO-GOLAYA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3336 4328 PHOTO-GOLAYA.exe 93 PID 4328 wrote to memory of 3336 4328 PHOTO-GOLAYA.exe 93 PID 4328 wrote to memory of 3336 4328 PHOTO-GOLAYA.exe 93 PID 3336 wrote to memory of 1224 3336 cmd.exe 97 PID 3336 wrote to memory of 1224 3336 cmd.exe 97 PID 3336 wrote to memory of 1224 3336 cmd.exe 97 PID 4328 wrote to memory of 2560 4328 PHOTO-GOLAYA.exe 98 PID 4328 wrote to memory of 2560 4328 PHOTO-GOLAYA.exe 98 PID 4328 wrote to memory of 2560 4328 PHOTO-GOLAYA.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Company\NewProduct\koollapsa.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\al99999.vbs"3⤵
- Blocklisted process makes network request
PID:1224
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\all2.vbs"2⤵
- Drops file in Drivers directory
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255B
MD5b04b812595c77552f793266087d01e48
SHA18aa91687c493c205fff5276ff9c5ba423d413900
SHA256cd4d0ac5a7d4ba74dd5b21e60ecfa906a2983a0a14c4c98c1f72407bdd3fa74a
SHA512e79812a137b0a5745d819bdd2f27897eab212846cddd938d5ff3de85f7f3d2ad963f744e26dead379b7453a0be3e70a0676e1d5935d09c04b45de64a735ad394
-
Filesize
710B
MD5e5a802d1a0ae777a8608b563a1e4560f
SHA19348d515e91f7928cd905f07305b213ced3715ba
SHA2569b00dbf70757dabc2f8dc2fe7454c71ad08e0ddeb98810be4f8174f5efece013
SHA512a7d0e1403f5fe3c66c3e5348bbc9cf09ff6e9a7be170461db8a6b0b330a1946eed90bb32c65d50f4b7b193efc40911fe0c4e9eafb2a10a6a4f0b87c3ed9bc441
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
2KB
MD5e8744368525a875205e7deaa1e7ed2b9
SHA19021736420e3099e3e4bcbe663879f204cf6a42a
SHA2565069c594f2a182ad825dfc17f598ed1b916344c4df89de29fd11f02f5d05fc25
SHA512f53a692ebd968840a87018b2cbd84b4b79a79f0005bfd80e3bf9aa1f4a569220e91265ddd91fc3e7445fa5d1ba2d2727d9da57673491b5f4173c12c58ab8b2a4
-
Filesize
53B
MD5ea979707f3b764bb471a7db90ab1cc7f
SHA17888f60b6d486a104525cc9737d65532fd0e4b2d
SHA256070ddbb0b3d083f95194ef4105e86baae4beb6fda76b1f701416d1db421053fc
SHA512659eb954b55ab126c63dbd911fe440752b98e7305070113dc9aba4f67aee2424a089e658abefd4afe16b3ab2f365487b738b4ac970e97a5a448046d4ba177efc
-
Filesize
1KB
MD5d9a93296f8c62ab96271667c72d7a3b3
SHA1abcf5a6ed773cfc978fc2176138778ad406c188a
SHA256f6c84e7c7fced4ae3ee3ca143fd5e134a183eb1e2f67ab71a6e9a902596be993
SHA512f91de9fbc57397c895aa1bda0ed18601711b1da377ceeee9d5a5ff48a4a3ba2e4feaacf3c64475c07daf584d6374e79d8206a49d1e25bc3044b2e4b6c7d4bd02