Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 09:06

General

  • Target

    RUSSKAYA-GOLAYA.exe

  • Size

    239KB

  • MD5

    759cb81096a6fde1b9ede08255248159

  • SHA1

    cff5496d52b61098a04251c050c6e04b5ad13178

  • SHA256

    9a00a517d51a4750fefc9fa7bb471a7ab9de1fbaf3d37ade6442682987a628a9

  • SHA512

    8c44879a5a58addae21e521a87b5a3c6a466abb71dfc7e3db3026331f6b49cbbc27df4fc8f9e74cfcc1e69e64660bfd5cb3a0bf7096e48a385b9fa9df06c3794

  • SSDEEP

    3072:QBAp5XhKpN4eOyVTGfhEClj8jTk+0hijkEDboYxU044U/1K+Cgw5CKHy:HbXE9OiTGfhEClq9YEXoyDjURJJUy

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe
    "C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\tokom kak neer delat\ne glad ego kisto4koi\svezee_techenie_cheloveko.bat" "
      2⤵
      • Drops file in Drivers directory
      • Drops file in Program Files directory
      PID:2860
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\tokom kak neer delat\ne glad ego kisto4koi\slooooowthespeedafer.vbs"
      2⤵
      • Blocklisted process makes network request
      • Drops file in Drivers directory
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\tokom kak neer delat\ne glad ego kisto4koi\slooooowthespeedafer.cross

    Filesize

    1KB

    MD5

    353b66dd45fa71e77b883b8d8f77a3cc

    SHA1

    27d2a73d0ebbca97ce8f1582b22f66e7abc0be0b

    SHA256

    b7b57a9ddf44852f88ff8da468bac62b6302ada2eaa8b24006e0b4bfb099cdba

    SHA512

    ded5a1f17560f2a7bc5e1a765162bcfd827eea0b9073c9ad8e88c8c706494174bc8fea01dc95df34b798f5847deb822cd98b51bc3dc7f4104343d0480503d203

  • C:\Program Files (x86)\tokom kak neer delat\ne glad ego kisto4koi\svezee_techenie_cheloveko.bat

    Filesize

    1KB

    MD5

    6daad30db16dca2393e95dc79993b935

    SHA1

    539786a8fc9d50a02c4d0299a88ce7c09ed414c1

    SHA256

    97c36a9e98886b271bd479fde0f384b75ef04399ebd1554d2490966d56d385d9

    SHA512

    ed9d7b8b3d14fc2136dd28788874446559f388e591c20d7e2e343a5a1d96bc1af46e6586da0a78ad0bcd15c9a170aad9d37c4b0dd840298b117b51ab7dac22a8

  • C:\Program Files (x86)\tokom kak neer delat\ne glad ego kisto4koi\xranilise_vsei_figni_tut.bok

    Filesize

    94B

    MD5

    192f4e93e60c4e559b075e5f9c2776f6

    SHA1

    ae3b367b8ebb97ce4d4324a951072872d16ac422

    SHA256

    6b85eb0052d703b4f2eef6279bc4c6ea1bca7a91ff966ee5f5c899b09e999b06

    SHA512

    f861f34f0e513acdcda92da757974c1bfb8624bebb10563a94c9ef02340bd264ee8267be9730ad3cec9f527c54cccc31b2a71da83369e31ac454aaae71360198

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    b4434980101442bcce3e0b0f6d12d743

    SHA1

    1a68111eba898c9b337b1dcd8cd803e339df5335

    SHA256

    9e8f7c183744c28ee7e84f2804a12185b1d330e25a929dd71c1adee6f6dbfb93

    SHA512

    86fc9e287d669446159989e463774cba0a5105c5394231782f41fd61cb41647ab48b4d773de11e06538721c4b10900548ac328e38fbfac217927dd9f9fdf9941

  • memory/4900-39-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/4900-41-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB