Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20231222-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
238KB
-
MD5
2e3a85fe7f547ed4ca30b9fc131d369e
-
SHA1
d3daf378467bc794ec3e93f9789f128bd8041ab6
-
SHA256
692244bdd8b7d3161f0a39836d6595926ac2f7917cee12a2d2646737842a9a7f
-
SHA512
cb0fdd92fe53136137d7a77225894d8d6948c5684cceabdf194af16742a70c10042374fe75d24673e8281b4fdd0e782d3986009879f50a7c9354b40ad1001cc6
-
SSDEEP
3072:QBAp5XhKpN4eOyVTGfhEClj8jTk+0hijkEDboYxU044U/14+Cgw5CKHm:HbXE9OiTGfhEClq9YEXoyDjUPJJUm
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 224 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation PHOTO-GOLAYA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.vbs cmd.exe File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\fresh_meamings_cold_not_to_be_hero.bat PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\Uninstall.exe PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\Uninstall.exe PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.vbs cmd.exe File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sobaki_ya_edu_vas_ebat.yahaha PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\fresh_meamings_cold_not_to_be_hero.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\net_v_zizni_nehera_etogo_kak_ego_o_stastia.jog PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.lll PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\Uninstall.ini PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\net_v_zizni_nehera_etogo_kak_ego_o_stastia.jog PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.lll PHOTO-GOLAYA.exe File created C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sobaki_ya_edu_vas_ebat.yahaha PHOTO-GOLAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings PHOTO-GOLAYA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4068 wrote to memory of 1972 4068 PHOTO-GOLAYA.exe 32 PID 4068 wrote to memory of 1972 4068 PHOTO-GOLAYA.exe 32 PID 4068 wrote to memory of 1972 4068 PHOTO-GOLAYA.exe 32 PID 4068 wrote to memory of 224 4068 PHOTO-GOLAYA.exe 30 PID 4068 wrote to memory of 224 4068 PHOTO-GOLAYA.exe 30 PID 4068 wrote to memory of 224 4068 PHOTO-GOLAYA.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\sri teplim kalom\singaraja eto les\sleep_my_darling_sleppp.vbs"2⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
PID:224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\sri teplim kalom\singaraja eto les\fresh_meamings_cold_not_to_be_hero.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5376e5445712d8c5cc0421c410b9e6304
SHA18e84244eb890d1b59c250cdcd809462fc8b2cda5
SHA256cf68688d70933ccc18c5c88a6478ddaa72ac085c62eb40f84b6c002fbc6608ce
SHA5126612785c73b1e9c155662706d4960a9badfa311154c2362e8b1f3df3f1989c7a4735c350519fdcb9149ce9af57285c34f10826e843e1fe8bd59d24993b910680
-
C:\Program Files (x86)\sri teplim kalom\singaraja eto les\net_v_zizni_nehera_etogo_kak_ego_o_stastia.jog
Filesize94B
MD5192f4e93e60c4e559b075e5f9c2776f6
SHA1ae3b367b8ebb97ce4d4324a951072872d16ac422
SHA2566b85eb0052d703b4f2eef6279bc4c6ea1bca7a91ff966ee5f5c899b09e999b06
SHA512f861f34f0e513acdcda92da757974c1bfb8624bebb10563a94c9ef02340bd264ee8267be9730ad3cec9f527c54cccc31b2a71da83369e31ac454aaae71360198
-
Filesize
1KB
MD5c5c2655eb75e4064684a24de4977b8fe
SHA1d6ad9f0666b127c5284d54b4316a4450af507828
SHA256145b951757bf065f894c8de1f6da43dce9648f00744860a8905804e9b38429d5
SHA5120b11dc1de167efe343a201742c6e5e04aae670922fef561c50ad4c2103fee6a5e451179785f9f47b348ba2b4b52cc8a6402ea0eb232634dc9b5ad70d39f29aea
-
Filesize
1KB
MD5b4434980101442bcce3e0b0f6d12d743
SHA11a68111eba898c9b337b1dcd8cd803e339df5335
SHA2569e8f7c183744c28ee7e84f2804a12185b1d330e25a929dd71c1adee6f6dbfb93
SHA51286fc9e287d669446159989e463774cba0a5105c5394231782f41fd61cb41647ab48b4d773de11e06538721c4b10900548ac328e38fbfac217927dd9f9fdf9941