Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:56
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-PHOTO.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GOLAYA-PHOTO.exe
Resource
win10v2004-20231222-en
General
-
Target
GOLAYA-PHOTO.exe
-
Size
149KB
-
MD5
0196884e4ae0fc48c9bf5f8260502466
-
SHA1
40a78aeb8bcd7abd24088e1103ac3b292c30992a
-
SHA256
20621acdaf45c4cbcdeb972a78a8baca5cb0327489da84523c406a1e740ec7ab
-
SHA512
cb9a56c4c3415c955befeaedcf83e92fbe768e1bcef07d280f0c5a3f047bbc6f9dc58532c4562088ee44bd8ec69acba371e22f42b92319517bd4d1cb6a66a55f
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHZYpz4PIsa:AbXE9OiTGfhEClq9k54PId
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2624 WScript.exe 7 2624 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\slusat\suffaling\bautmyside.txt GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\sitbaby.vbs GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\Uninstall.exe GOLAYA-PHOTO.exe File created C:\Program Files (x86)\slusat\suffaling\Uninstall.ini GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\slonik.pokakal GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\podkluchidruga.bat GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\lit.vbs GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\nerabotaert.life GOLAYA-PHOTO.exe File opened for modification C:\Program Files (x86)\slusat\suffaling\ebanettkebanet.vbs GOLAYA-PHOTO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 292 wrote to memory of 2756 292 GOLAYA-PHOTO.exe 25 PID 292 wrote to memory of 2756 292 GOLAYA-PHOTO.exe 25 PID 292 wrote to memory of 2756 292 GOLAYA-PHOTO.exe 25 PID 292 wrote to memory of 2756 292 GOLAYA-PHOTO.exe 25 PID 2756 wrote to memory of 2624 2756 cmd.exe 24 PID 2756 wrote to memory of 2624 2756 cmd.exe 24 PID 2756 wrote to memory of 2624 2756 cmd.exe 24 PID 2756 wrote to memory of 2624 2756 cmd.exe 24 PID 292 wrote to memory of 2732 292 GOLAYA-PHOTO.exe 23 PID 292 wrote to memory of 2732 292 GOLAYA-PHOTO.exe 23 PID 292 wrote to memory of 2732 292 GOLAYA-PHOTO.exe 23 PID 292 wrote to memory of 2732 292 GOLAYA-PHOTO.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-PHOTO.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\slusat\suffaling\ebanettkebanet.vbs"2⤵
- Drops file in Drivers directory
PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\slusat\suffaling\podkluchidruga.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2756
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\slusat\suffaling\sitbaby.vbs"1⤵
- Blocklisted process makes network request
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884B
MD57e070563d0c8bf0f083b07d68389f706
SHA147b6834223c5597774a3a045dedece938f4a2e48
SHA25654001e5eb3ccd7cda65ca05e1cdeab43e22db8fd05d8d80759bf6fee0c4ed0b4
SHA512adf4dcdc420cba0bdf86d038361e0fb643ccda8099fb79abac0c0b68d6a95cd11f32f169d58cb39e9700b48d10aa70502216fa7bd8c2765a8c86812909eebd22
-
Filesize
65B
MD564ae0715e0770708dcf1ebc677ced690
SHA1e2c51aa34d8e771bd9555c9484b940411af77744
SHA2561b7a9316e9319e5a14b488159b0a41b81d838e0546ae1767da85ca5f533acf23
SHA5125537a48eb41657252757cee21b51477a2b1e15e066f4cba090c87f7de8293297f9944be0859ecf20e41733bf5d4f3d994d35ab2594c5ab7e09e826d5cbb1495e
-
Filesize
4KB
MD5e09982b4f7254a0a5a906cbacfc7b976
SHA18e0717e4993d6cbb67bb77b0ce0cb9b033d6cf33
SHA2564c8e0924e9d424a4f82da2dba694e6ce00405f99876100be76a4fbc6dfe9479e
SHA512a0bff8820a5f39b98fdfa03f8b0e1e6bb05bc50a4ef7671e0ee80b5afc4e7e5b912da5da038627d808a1850c89320009982664988a9468baa77fd0ffd3e91c04
-
Filesize
360B
MD56ee75ac07365c99a117a2f947003a19a
SHA109ef4f1a459faa8be9f3995688c32587c2b45392
SHA25614be2b44e68f3463c783d0bbb83e8468a5967b64711592c5c6ca51b60533febc
SHA512f9a897fa1a07958ccc594a065809cea8068ee837244d4415696e0c76e393c4394aefa6b4ebbf56184ee9a6433d29b9b673108ffe018cf871840c743784e8f15d
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
1KB
MD544ccd2e0f82c735fbef30c341d6bfc10
SHA18cc305f7f8fff401380175ae0cc7d0df99b83373
SHA256d29b19381fbf3494195232c63a36e6a9d38de4e2db3e80ae3f007a36e9674db3
SHA5128627b9c13415f5d9c917692281f2a33aa4286f0a50b0d08933ca663cd6cc12fb17256a2270ff283dd497661001b6c06f3d16e889215821659fa24ede367dfe07