Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231222-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
149KB
-
MD5
082651eefe9806f50fb938f393148d45
-
SHA1
61817d9547cbfc0490511c8599261b62adbc61fa
-
SHA256
dd854c4d604f2add306b0e004097c9fb897b4107f02407d4b521abbc22919bbd
-
SHA512
3c8cd68bd19fb0fbb40ed1a5f53d7f83f152c4aced62e137bd7771303da26a4e74ce2648958909f2f92506ea2508665d7139a11b0568740104df87b68bcaf994
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiIvh5iBZ:AbXE9OiTGfhEClq9SE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation PHOTO-GOLAYA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\salst\ogurets\Uninstall.ini PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\stuckja.jol PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\Uninstall.exe PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\122.txt PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\all3.vbs PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\polenolll.pof PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\podkati.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\lit.vbs PHOTO-GOLAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3212 wrote to memory of 408 3212 PHOTO-GOLAYA.exe 28 PID 3212 wrote to memory of 408 3212 PHOTO-GOLAYA.exe 28 PID 3212 wrote to memory of 408 3212 PHOTO-GOLAYA.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\salst\ogurets\podkati.bat" "2⤵
- Drops file in Drivers directory
PID:408 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\all3.vbs"3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs"2⤵PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299B
MD5399aafbff20b97ae2c6119061d41cbd0
SHA13056f90e2696e9564c9a3419cc7a7c03ef14b429
SHA256898eebf1486b8d382f0001cec8604b4711d21e3015334bd5a49f60d39ebdc1fe
SHA51285627296a59270aa783bf64d55d2560d9ee18eaa9de88deae4b8170581bd18450f53bfbbd9bdb6ec3a99ac8a06545252a1b10a13fa3584bb75dae4f917ed1606
-
Filesize
3KB
MD532476fdee702c96f10c2bf839d4999ea
SHA16eba74027756760c7a3b22957efc215fbf9871e5
SHA25678a635131e9f79f01185e120ecd29fb09260b56b678fccd3b23245fac2b673d3
SHA512a5b73557a2293aff4b3d0e5a2f185af54abdda68ea40b5f167271da91e32f199af06bc60a6d6da4faeef960bf9844b538788745bf4c5a590807081cb6f280234