Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:29
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-TOPLESS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-TOPLESS.exe
Resource
win10v2004-20231215-en
General
-
Target
GOLAYA-TOPLESS.exe
-
Size
180KB
-
MD5
f28c1e58c5766a111297588e8ab02361
-
SHA1
3d55a55fd6d193d32742fe89bf6041f9182ee447
-
SHA256
6e239da433517b0856f91d212baebdf1963d80ba6c546a440da19121580818ca
-
SHA512
e09add020c39a8fa5b14f094679daa9d0645f4c0fe39a33194e9c4c3cdadee05986904084387437203387d97be4381c9714e47451aff01e6a7e6fcb5ec9797fd
-
SSDEEP
3072:6BAp5XhKpN4eOyVTGfhEClj8jTk+0hL/eSZZvLf6CNsPrXJ8WYQKaLba:JbXE9OiTGfhEClq90GSZZvLCCNsPrXJa
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 10 1100 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation GOLAYA-TOPLESS.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\nasri_v_moi_rot.govno GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\chilli_v_zope\04en_cheshetsa_pizdets.bat GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ez_i_baldei_po_polnoi.vbs GOLAYA-TOPLESS.exe File opened for modification C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ne_zabud_hoppersi.vbs GOLAYA-TOPLESS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings GOLAYA-TOPLESS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3980 1984 GOLAYA-TOPLESS.exe 65 PID 1984 wrote to memory of 3980 1984 GOLAYA-TOPLESS.exe 65 PID 1984 wrote to memory of 3980 1984 GOLAYA-TOPLESS.exe 65 PID 1984 wrote to memory of 1912 1984 GOLAYA-TOPLESS.exe 67 PID 1984 wrote to memory of 1912 1984 GOLAYA-TOPLESS.exe 67 PID 1984 wrote to memory of 1912 1984 GOLAYA-TOPLESS.exe 67 PID 1984 wrote to memory of 1100 1984 GOLAYA-TOPLESS.exe 66 PID 1984 wrote to memory of 1100 1984 GOLAYA-TOPLESS.exe 66 PID 1984 wrote to memory of 1100 1984 GOLAYA-TOPLESS.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-TOPLESS.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\chilli_v_zope\04en_cheshetsa_pizdets.bat" "2⤵
- Drops file in Drivers directory
PID:3980
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ne_zabud_hoppersi.vbs"2⤵
- Blocklisted process makes network request
PID:1100
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\edem_na_adam\krasnoe_na_chernom\kutturotti\ez_i_baldei_po_polnoi.vbs"2⤵
- Drops file in Drivers directory
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fc2fcf4351f2aded0dada73e9f8d576f
SHA17b6e794c9366485a36e06eafb01d0f4a4d8691bf
SHA256b0836c3e971d44ab408e6a809a891c3818ee80329f26af232295ef8518c9ba91
SHA5124c673179d008c12685d282429afa89f477306624c473cc9475b90e09b58a69eee871cb26533d11f6c39c15a3693dd28ee3684dfed737f0b65c268842d1c24331
-
Filesize
923B
MD57e250a4c3a7a6449119c02ffa9152fb3
SHA13d9e376ebd79cdcdf4545d2517e24bf4cc0ae3e5
SHA256572ccd595ec789cc3c56de893214e2b102aaade4cf791b1df1a9d5d478343ce1
SHA512ffa60a58dffeb27f9aa50e2e203ce817ec7af4bc29bb50cbe47e21ffa15d68afb15d517140ac1242e6604588adc3a205f0036eb2a45008d5d153e721a695fc17
-
Filesize
700B
MD5d00588d055e55ec3c9b932160f5d8871
SHA14ab42990617c4a65186da8b02c0029b38a4d6022
SHA256ad14702ab903328311dfa29ac20ea72344153a92d4c5e26f46fa00b8c244f1aa
SHA512fed047bd84641dfb44c4093e24f3e983f7f69f9e604bc1dae4156daf3b395855fa0d32f611df216cc05c599f0f7cf7daf5bb9da781a5890328d5bb1c83db8e91
-
Filesize
1KB
MD52296897b43ba3d81a95d621853e0ef3d
SHA1bd479992fbe2ec2145b295be5ab9ef8e317ea333
SHA256078d83575dfe7286ddc05b29032dcf3de76d74cae149d94163fddf83c1f5df49
SHA512ab9a82da93b1c4e89dd7b40ca5a489b4cbee366c2d5f0ca40c810248efcf32ca6c86abdc46fafaa838eaa5ea607740ac85bdda89f212c3669418ccd7d3e8619c