Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20240802-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
238KB
-
MD5
2ca498cc00b0c5baec004b731621c97d
-
SHA1
41d2d779185cd6274ad1fffecabbbec1d781fd42
-
SHA256
400b70f625095ce4995eb1e8188e319572abd8a67dacc3b1567641c039dbebf0
-
SHA512
173830127c25ee0bb1296943930eac3a49da174ad18725f293d46922bac224e0200cfa17a6c5226379bac89d1e5980c7549687b023c4bf92c9f45ec6d5e6538c
-
SSDEEP
3072:VBAp5XhKpN4eOyVTGfhEClj8jTk+0hNq1dgshuk+Cgw5CKHm:wbXE9OiTGfhEClq9UqTaJJUm
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 2592 WScript.exe 5 2592 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\net takoi papki\slonopotam\1.txt GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\1.txt GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.ini GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLAYA-SEXY.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2800 2256 GOLAYA-SEXY.exe 29 PID 2256 wrote to memory of 2800 2256 GOLAYA-SEXY.exe 29 PID 2256 wrote to memory of 2800 2256 GOLAYA-SEXY.exe 29 PID 2256 wrote to memory of 2800 2256 GOLAYA-SEXY.exe 29 PID 2800 wrote to memory of 2592 2800 cmd.exe 31 PID 2800 wrote to memory of 2592 2800 cmd.exe 31 PID 2800 wrote to memory of 2592 2800 cmd.exe 31 PID 2800 wrote to memory of 2592 2800 cmd.exe 31 PID 2256 wrote to memory of 2552 2256 GOLAYA-SEXY.exe 32 PID 2256 wrote to memory of 2552 2256 GOLAYA-SEXY.exe 32 PID 2256 wrote to memory of 2552 2256 GOLAYA-SEXY.exe 32 PID 2256 wrote to memory of 2552 2256 GOLAYA-SEXY.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs"2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
679B
MD51e13b9527a12dffe2998bf760c127814
SHA1aec14d10a204872cc940550fa7876b2081373f01
SHA256355dafd0f4053c07306b5505a4a5333ad4f2afb79a1d5fd35798282bdac79c38
SHA51216e2d3e546030a7d452455f170ba731484006e6b645cc201b854ec11d115ce6182602e5a18a74859f5fdff7dda4939e30dbb5abe6313388e556784879a2e425d
-
Filesize
53B
MD5458f8278e6db63a24dd7874915404c05
SHA12a8b5a312231a4fcd88db0b23c91bb504d35b9b0
SHA256c802072462fcfd13b9410d839530c95e3ec526cac9fe273a35a78312d436817d
SHA5120b05dca8f971df3e5bce2a461455117b6052cfeca3d646bee6c66d3c6c69be31b9d98228cf1c6cb972856c90889aab6f883d25c6e5a6292f17fc12505af9cc50
-
Filesize
189B
MD54916a96fa815d608e91d931df33122f9
SHA193a9849116673ad184ca7a5f32d0bea2d30762a4
SHA25619ba1285b426e131f629eb1afddbe1350c71dc6188cd14779bb65123cb7a728f
SHA51278a73b8879cd3179dbdf7a4a2805659b20efacf1a090c64c875e8915a297c17cde9165f9da0a4ad70abc11745c61d824e047e0e3ba8e2e587ca1b1011b2f9ca7
-
Filesize
1KB
MD50715369b6dd1face650d3625223bf4db
SHA1788a33cc2fac1697fd265c57448e5618d1c438d0
SHA256492f2286987ba02fd03a735d89126254b540f140e2ee07f7d1c3481a1d422f30
SHA512200fdc5e01cb26602e134bf3b0474dca2c0e1a85c2505240a76094782b893355a18249549165a06228d6663146a4b992b249e321e31d1364bf381c075d896d99
-
Filesize
1KB
MD52f9c045fc3a02a6e1047dc1365ff70d6
SHA1484298b8f3d58b92bcca200f23243d561ce537c4
SHA2564de127588b9e7971f21601163457726ec5452bc64c0c184bcb8049fa6ff4e353
SHA512e2f5918f2213b550a2c288a36f3f15f0dede58e76ac3fc5d0399a9691d51a6b9f177f6aaf5b4d3a563c7000f5b6510b464792830166aeca383990cffbaa872e9