Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
RUSSKAYA-GOLAYA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RUSSKAYA-GOLAYA.exe
Resource
win10v2004-20240802-en
General
-
Target
RUSSKAYA-GOLAYA.exe
-
Size
239KB
-
MD5
6839c4c1e533bdef312fa9501b7cd622
-
SHA1
0a4a288e686a64c0d926e5d5c7ddd46ec7eeeaa1
-
SHA256
5b40e9c2a5bbd190d09eade750b1ce1a48887f6822a3e8a4cf3f927c38088982
-
SHA512
d0cafe97a7ab0444424d88d6fddbe2bb0bc9d33abaaeec21101388982d40728d5114d30d1d9b3f7b5d0ea77cbfc6f8067256d4cd7613d14de74ccd196a1dd954
-
SSDEEP
3072:MBAp5XhKpN4eOyVTGfhEClj8jTk+0hYoO/MgjqEWBz+Cgw5CKHy:7bXE9OiTGfhEClq95/MgXJJUy
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 936 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation RUSSKAYA-GOLAYA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Twitvid allows you to easily.home RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\pizdaxui11.eb RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Uninstall.exe RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Uninstall.ini RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\pizdaxui11.vbs cmd.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\kolitmna.kol RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\xuipizda\1.txt RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\olologggg.vbs cmd.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\olologggg.vbs cmd.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Twitvid allows you to easily.home RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Dogma.bat RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Dogma.bat RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\pizdaxui11.eb RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\kolitmna.kol RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\xuipizda\1.txt RUSSKAYA-GOLAYA.exe File created C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Uninstall.exe RUSSKAYA-GOLAYA.exe File opened for modification C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\pizdaxui11.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUSSKAYA-GOLAYA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings RUSSKAYA-GOLAYA.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3128 5016 RUSSKAYA-GOLAYA.exe 84 PID 5016 wrote to memory of 3128 5016 RUSSKAYA-GOLAYA.exe 84 PID 5016 wrote to memory of 3128 5016 RUSSKAYA-GOLAYA.exe 84 PID 5016 wrote to memory of 4860 5016 RUSSKAYA-GOLAYA.exe 86 PID 5016 wrote to memory of 4860 5016 RUSSKAYA-GOLAYA.exe 86 PID 5016 wrote to memory of 4860 5016 RUSSKAYA-GOLAYA.exe 86 PID 5016 wrote to memory of 936 5016 RUSSKAYA-GOLAYA.exe 87 PID 5016 wrote to memory of 936 5016 RUSSKAYA-GOLAYA.exe 87 PID 5016 wrote to memory of 936 5016 RUSSKAYA-GOLAYA.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe"C:\Users\Admin\AppData\Local\Temp\RUSSKAYA-GOLAYA.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\Dogma.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\olologggg.vbs"2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\lop1\piccoloucioamepiacanutella\pizdaxui11.vbs"2⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c116ccc255832c552d663600eb1d142a
SHA1bfe7637478bbcbee0253df07cd2d20d3e7e5c04c
SHA25610be330e7e4da276d80edb4123f37610b8284b77b6b5f809fc128558d44a2560
SHA51200eee11e8efa70bd728c182394d15063c5f192f4e673cd64930a77735c28cd8944062ffe06eaeec4b9e8e5bb259d1d61eaf6074018d2bffa99d9c9641f9a7688
-
Filesize
92B
MD5119d851aca579cb6d3b3f996209ae746
SHA18269aa49847598efea40cd76a43846238da6c791
SHA2564f8c85a7fc4aaf52afc6fb758ea289640c8dc03d38557b12d5ed92d2c8d9005d
SHA512244b4535f9af527324977c3cd744912fb56b3946d2a1c3188725ae10753eccc969ed9b3f602b9c13e1e8df268290d7d38a1304213043e79ee2258ccb90ed25fc
-
Filesize
628B
MD53b007c1b75cc2e976187ad8387b31b8a
SHA1f34230fbb690026536ead92ab51fb97fa4f90f00
SHA2564cbc257c9ee854c9ea8c39f2d021db2ceea44fb2adee64fcaf7596cb2e03f04b
SHA512b9d23a4eceeb124f7be3cad975f013344a04656788f7a2ceb160a9e0268631029f963595b5522b7fb6865c74c2b0cdd45652bc2234329eba7f46dafe051e33c8
-
Filesize
185B
MD5b6ca24e2cc23d2c4ab76cff73b6705b9
SHA1028560ec53255c570a99884061443285f363a9ab
SHA256dc7ff1cd3688a4332b64cdc31beb07bb3de9e1b578433aae8e1b296aee4385db
SHA5124ec8a185eb1d7fdf2a6d9d6a59750338649a899ced69097bf494443652ddc8e8177f4b4de7af60d459251cd3ebca6e417164a46388096424ab96c21b39182e26
-
Filesize
1KB
MD5435d5b9ac8adeb9d27fad84bf5303c6b
SHA1bde744ec28854dae3189115a948db25c2e21a886
SHA2568c2c870afff5c4585252a9bc7675674b5756f316bb2bd0d63c09ee07972ea411
SHA5124460ee340753053374c72342d5f0878fc30a1f10d4cbde5b55440932479ab35d42487af08a27703dcf06dedf875b25ec9a888974f8adeee3243afd2f9425cb8e