Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-RUSSKAYA.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GOLAYA-RUSSKAYA.exe
Resource
win10v2004-20231215-en
General
-
Target
GOLAYA-RUSSKAYA.exe
-
Size
149KB
-
MD5
082651eefe9806f50fb938f393148d45
-
SHA1
61817d9547cbfc0490511c8599261b62adbc61fa
-
SHA256
dd854c4d604f2add306b0e004097c9fb897b4107f02407d4b521abbc22919bbd
-
SHA512
3c8cd68bd19fb0fbb40ed1a5f53d7f83f152c4aced62e137bd7771303da26a4e74ce2648958909f2f92506ea2508665d7139a11b0568740104df87b68bcaf994
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiIvh5iBZ:AbXE9OiTGfhEClq9SE
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2636 WScript.exe 5 2636 WScript.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\salst\ogurets\all3.vbs GOLAYA-RUSSKAYA.exe File created C:\Program Files (x86)\salst\ogurets\Uninstall.ini GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\podkati.bat GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\osjovnofr.vbs GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\122.txt GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\Uninstall.exe GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\polenolll.pof GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\stuckja.jol GOLAYA-RUSSKAYA.exe File opened for modification C:\Program Files (x86)\salst\ogurets\lit.vbs GOLAYA-RUSSKAYA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2696 1924 GOLAYA-RUSSKAYA.exe 29 PID 1924 wrote to memory of 2696 1924 GOLAYA-RUSSKAYA.exe 29 PID 1924 wrote to memory of 2696 1924 GOLAYA-RUSSKAYA.exe 29 PID 1924 wrote to memory of 2696 1924 GOLAYA-RUSSKAYA.exe 29 PID 2696 wrote to memory of 2636 2696 cmd.exe 30 PID 2696 wrote to memory of 2636 2696 cmd.exe 30 PID 2696 wrote to memory of 2636 2696 cmd.exe 30 PID 2696 wrote to memory of 2636 2696 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-RUSSKAYA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\salst\ogurets\podkati.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\salst\ogurets\all3.vbs"3⤵
- Blocklisted process makes network request
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299B
MD5399aafbff20b97ae2c6119061d41cbd0
SHA13056f90e2696e9564c9a3419cc7a7c03ef14b429
SHA256898eebf1486b8d382f0001cec8604b4711d21e3015334bd5a49f60d39ebdc1fe
SHA51285627296a59270aa783bf64d55d2560d9ee18eaa9de88deae4b8170581bd18450f53bfbbd9bdb6ec3a99ac8a06545252a1b10a13fa3584bb75dae4f917ed1606
-
Filesize
3KB
MD532476fdee702c96f10c2bf839d4999ea
SHA16eba74027756760c7a3b22957efc215fbf9871e5
SHA25678a635131e9f79f01185e120ecd29fb09260b56b678fccd3b23245fac2b673d3
SHA512a5b73557a2293aff4b3d0e5a2f185af54abdda68ea40b5f167271da91e32f199af06bc60a6d6da4faeef960bf9844b538788745bf4c5a590807081cb6f280234
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9