Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20231215-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
149KB
-
MD5
8038ebcd984916c69c58ede697dbe7b4
-
SHA1
94e4561a06e0b423bc5b76c49234a977a869aae8
-
SHA256
ae6226759da82fa559e63bc55b1e62a103c98fae2d246b81d43eae1826c99064
-
SHA512
1acbf5b396f5e88c85ad4e86cf25ad2722f681d42c31bdc113f66c70a8fa6015da20af4a0418e75fbdb350c09c80785fd08e2161b5cdb5ae067636e5715355bf
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hi38puk4NUtjV:AbXE9OiTGfhEClq9qptV
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 3024 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation GOLAYA-SEXY.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\hhhh.txt GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\all2.vbs GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\koollapsa.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.pp GOLAYA-SEXY.exe File created C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\slonik.po GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini GOLAYA-SEXY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings GOLAYA-SEXY.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2676 2400 GOLAYA-SEXY.exe 89 PID 2400 wrote to memory of 2676 2400 GOLAYA-SEXY.exe 89 PID 2400 wrote to memory of 2676 2400 GOLAYA-SEXY.exe 89 PID 2676 wrote to memory of 3024 2676 cmd.exe 93 PID 2676 wrote to memory of 3024 2676 cmd.exe 93 PID 2676 wrote to memory of 3024 2676 cmd.exe 93 PID 2400 wrote to memory of 3820 2400 GOLAYA-SEXY.exe 95 PID 2400 wrote to memory of 3820 2400 GOLAYA-SEXY.exe 95 PID 2400 wrote to memory of 3820 2400 GOLAYA-SEXY.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Company\NewProduct\koollapsa.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\al99999.vbs"3⤵
- Blocklisted process makes network request
PID:3024
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\all2.vbs"2⤵
- Drops file in Drivers directory
PID:3820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD5dd1664a1bd6c20ff17e7ab15e00510ee
SHA11ebbcb2ef9c68141cd0d5ab5d348d6417c303a5e
SHA2565cbd54d4928f6b5e68ab54046e015f10ae5d044a7a10d138f4a5b953707f0a43
SHA512f13d1021ec90af9103665e9e5242af28e85137f83400931bc852c4f78bf2b25fc600b3e6cb4f48754cc37c78da729a7904d25af2130b76fa84a4f2fa82ecbadd
-
Filesize
758B
MD5f146f415df0981d96d10be43c8042424
SHA12f4125b5312566d96079de4d5723879ee5c71ada
SHA2562d443c61261981b7023dca06f82dde969dbef6bfabf2a3e5e643d166e3165dae
SHA512a61f3252f5ebc90ea84262103ec03b26d93ec34dbf73a81e18e820c8fd2ecaafc0c184895f54314d54bc809528d37e8bba8859129117ca0a7ebf6646fa77080a
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
2KB
MD597500c34cf7c2f6ab00e202bc4dd4229
SHA11386e443b33609143e94f13c42bacffb8e8c5126
SHA25667fa3bea764831799e89d164c3eb29d408b9057b321e7745a18083201b106c9c
SHA5120d0d73181b5743605c52704391961c57fb847fe92681222cfd98a500435ad8c47539b2ae6a0e988f69f17fc64d3fe5a68562298bde0e0dc956c0d365a2ae7350
-
Filesize
42B
MD5645762809de5650cae734e629a60c92e
SHA17a84e6c54c2c30b90ad7590fb285605e1a0fb21f
SHA2569fb02cdb68a2deb143ff90f757c9275916dc912a90170a328ec08f23829d156f
SHA512c7787ce50d0038c187798951b6b25d9e0afb51915b6d3bd98339cb8e4f4e4c1c4efa7829b32afa81d570b190535b1667486d1fdf04a65e32093a83480581212e
-
Filesize
1KB
MD5d9a93296f8c62ab96271667c72d7a3b3
SHA1abcf5a6ed773cfc978fc2176138778ad406c188a
SHA256f6c84e7c7fced4ae3ee3ca143fd5e134a183eb1e2f67ab71a6e9a902596be993
SHA512f91de9fbc57397c895aa1bda0ed18601711b1da377ceeee9d5a5ff48a4a3ba2e4feaacf3c64475c07daf584d6374e79d8206a49d1e25bc3044b2e4b6c7d4bd02