Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20240412-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
180KB
-
MD5
b5a44c060c6c4a2d439f9906574a0073
-
SHA1
89db03d3f47080cca01ebc298f8c989a6b13d3ff
-
SHA256
d1e011fc69e871b93db9de9f90422097fd88f220ecf664be1d718d2d25fc1c33
-
SHA512
26b09dc50fe71874c3a96c9434d82681a7ceb588869a5a6e070f5d77daea912d82350745ffd1ecc2fb59c56598fcd15289598cdfca3ddbd6ea416eaf8bb6ae88
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0h+tzYOuI0m7:1bXE9OiTGfhEClq9dYpI0M
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2576 WScript.exe 5 2576 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\popizdota.dot GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\333\why_do_you_cry_willy.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\____000000_hello__.vbs GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\_hello______22222_______.vbs GOLAYA-SEXY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2636 1728 GOLAYA-SEXY.exe 28 PID 1728 wrote to memory of 2636 1728 GOLAYA-SEXY.exe 28 PID 1728 wrote to memory of 2636 1728 GOLAYA-SEXY.exe 28 PID 1728 wrote to memory of 2636 1728 GOLAYA-SEXY.exe 28 PID 1728 wrote to memory of 2524 1728 GOLAYA-SEXY.exe 30 PID 1728 wrote to memory of 2524 1728 GOLAYA-SEXY.exe 30 PID 1728 wrote to memory of 2524 1728 GOLAYA-SEXY.exe 30 PID 1728 wrote to memory of 2524 1728 GOLAYA-SEXY.exe 30 PID 1728 wrote to memory of 2576 1728 GOLAYA-SEXY.exe 31 PID 1728 wrote to memory of 2576 1728 GOLAYA-SEXY.exe 31 PID 1728 wrote to memory of 2576 1728 GOLAYA-SEXY.exe 31 PID 1728 wrote to memory of 2576 1728 GOLAYA-SEXY.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\na ulisdf\take me tsdf\333\why_do_you_cry_willy.bat" "2⤵
- Drops file in Drivers directory
PID:2636
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\____000000_hello__.vbs"2⤵
- Drops file in Drivers directory
PID:2524
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\_hello______22222_______.vbs"2⤵
- Blocklisted process makes network request
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a94ee45e63e79a94e97e9185ef33d4ca
SHA194b83eb3bacfd8f953212fcb06c7fc9c456d2d60
SHA256363547c471bc514125a673a361da6e9b8a7730edecceaed29bd6264a6f6e5767
SHA5129b0141e6d210405fb42ef9b5bb1b599b9557468a6c8ed031ea85ce894973a40cfd85bc0cc4c71b3d35796d0a09e3861056976dcdd271d8be4398cb3086248580
-
Filesize
891B
MD5a3738d04672653309492abe7672c4b13
SHA16d31ecf5dcf9528921770be71c9f8614e2565a6a
SHA256f8fbaee53e690286422a5d103a9032d13094c6ce3bcf083a00ee566d91d7b8f4
SHA512f4319c47314276d0d647c778eca7195c5d2e2bee97eda224ee0b92bc10cf51ece721b67555cd26a9df84666119317bf605081df8c3217e7af0bbe191d7fe2231
-
Filesize
620B
MD562f1bb6e29bf1d1b0e8747b957bee9d0
SHA1740704f420c9744bf989e0b9ad2c73d2854e3386
SHA256a48f9853b3c4773cc680b13bd5a565ec568abdbce9e7069de50ccfec3db7d59c
SHA512fa9d8ec7847a16dc14a439bf7704dd062d924bc18d95b92059b157d090043be674f47bf2eed7e2b3e9413381ecea56889d6da194fe77cc2d8ec742d9efb5d2b2
-
Filesize
34B
MD5aa5511a167a67e429a9fdf3ac25bce0e
SHA18ac961be922cdc3314ed342e809d68637e9ea1f2
SHA256bcf768f1b7db9992ed293fee0d986033c0ed203ad7698cc3f0eec8faad6a4665
SHA512736021521ab3062dd0b748fe989b942c52e2978e7d7313d66684518c4209a8816ccb7cd0229306c1f4fae1cac2c4d107fff52c9d027d4f04d0d4cb736ca53a10
-
Filesize
1KB
MD525ee27baa31c59fdf6cf5d18955ef985
SHA151d4725afa6d997cb7347c60a7d17485a8fb2ea7
SHA25675daf3b3c78bc2038351bee72d6036edf869f7106da7366722b1cd03f26f195d
SHA5128a4e1f971b8158db5df7b24b8f0d317d2397209c21ab07c6e6014bc767bbc95e32093fb59e2e67369687c9ed024ff6d354652d02424a8050500a410369abe12e