Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-GOLAYA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PHOTO-GOLAYA.exe
Resource
win10v2004-20240221-en
General
-
Target
PHOTO-GOLAYA.exe
-
Size
239KB
-
MD5
2b39981352a5356af3c6ef0f147e38d0
-
SHA1
06d295b726af54cfa5fff54884a775349e089e77
-
SHA256
f79f92660dffba6030e27b31734b990fdf1c3ac84805cd0757a889e4909cbd3a
-
SHA512
1a28c51973a67d62f0e12ee51445fce6f5c830c10da70323daa5ce3568600a0fa59e9f188b154250af6c933f8e748cfc5932d757baa8056ab340a0ad43a1ff1d
-
SSDEEP
3072:JBAp5XhKpN4eOyVTGfhEClj8jTk+0hqIgMKTNRfE+Cgw5CKHK:MbXE9OiTGfhEClq9nlNPJJUK
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2492 WScript.exe 5 2492 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat PHOTO-GOLAYA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\opasdkjsadflijsldf.wf PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.exe PHOTO-GOLAYA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\opasdkjsadflijsldf.wf PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro PHOTO-GOLAYA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.ini PHOTO-GOLAYA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs cmd.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua PHOTO-GOLAYA.exe File created C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\Uninstall.exe PHOTO-GOLAYA.exe File opened for modification C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2724 1856 PHOTO-GOLAYA.exe 28 PID 1856 wrote to memory of 2724 1856 PHOTO-GOLAYA.exe 28 PID 1856 wrote to memory of 2724 1856 PHOTO-GOLAYA.exe 28 PID 1856 wrote to memory of 2724 1856 PHOTO-GOLAYA.exe 28 PID 1856 wrote to memory of 2492 1856 PHOTO-GOLAYA.exe 30 PID 1856 wrote to memory of 2492 1856 PHOTO-GOLAYA.exe 30 PID 1856 wrote to memory of 2492 1856 PHOTO-GOLAYA.exe 30 PID 1856 wrote to memory of 2492 1856 PHOTO-GOLAYA.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-GOLAYA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\froggi_nogcci.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:2724
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.vbs"2⤵
- Blocklisted process makes network request
- Drops file in Drivers directory
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59035b833c805a3c4cd6d9d5f12518415
SHA1fc703a4a33f2e87cdca3653fe283c724b6bf2e88
SHA256580c52daabc37afbfa437934bfe0459147acd387ad55e4a2435d984c98a9ee3c
SHA512aab62152a9da71399498f10ffb8f8a7d69bb2a0125f6c2377ee5973c3a3a5d1eb6952790ec44ca94f3f14c92eb5cf3a86a9ad6001b445bd2f1ea36a38149de40
-
C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\netu_pokoya_mne_gore.tua
Filesize1KB
MD570f82479add509725394fab75b5507c3
SHA13eed208a455295f19df8aafe74fc69980d283281
SHA256305e34e742e111ae36b2f9dfe36e7461a392f4672efce52767b117fa98a37c3b
SHA51259b2d8c62f659b1ab4757b200c787a1ef237c76bac1d21538ec77f38c55b0f04a6a59cb1e88ce4f27d740fabdc4ec0672d31be978bf5ef1e826ba730e30f9b9b
-
C:\Program Files (x86)\oni_voobshe_ohueli_haher\yarko_zeltie_vot_eto_da_bleat\pod_yasnim_nebom_yanvarya.pro
Filesize106B
MD574305d205702e48e96da6265224b456f
SHA1387686c3598b5d9bb084f1597aeb3c1687b8b001
SHA256afc5e57f3536cc17c46c377efe3746f80079b1917597bb3430298ddb570a3faf
SHA51267fb29190052df27d2a5166a9de5233b64037aac5d00cb31c986850bfcb91f6df8927aa76140dcb126cd8f82eb8dc6c5aaef87816ec5505f176ff62286fafdf0
-
Filesize
1KB
MD58aaf3ecca37a8919fc3d03fd8afccff5
SHA1ec7cec657f482fdaba785fc33e487816d8292e5e
SHA2568f33ff8bf0e1ce50e9d82e003e9c541c31381ab6b64b1e003cae60394fbf8e9c
SHA512ee5f7aa0536266e55733fc72ba0ccdfa1340a8885a3d8dbcbb22b8ebc6853541c70ade83f036a2d411956b98e9354ae81c5a132f0b576725c8a0676e76b2bba7