Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
GOLAYA-SEXY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GOLAYA-SEXY.exe
Resource
win10v2004-20240802-en
General
-
Target
GOLAYA-SEXY.exe
-
Size
238KB
-
MD5
2ca498cc00b0c5baec004b731621c97d
-
SHA1
41d2d779185cd6274ad1fffecabbbec1d781fd42
-
SHA256
400b70f625095ce4995eb1e8188e319572abd8a67dacc3b1567641c039dbebf0
-
SHA512
173830127c25ee0bb1296943930eac3a49da174ad18725f293d46922bac224e0200cfa17a6c5226379bac89d1e5980c7549687b023c4bf92c9f45ec6d5e6538c
-
SSDEEP
3072:VBAp5XhKpN4eOyVTGfhEClj8jTk+0hNq1dgshuk+Cgw5CKHm:wbXE9OiTGfhEClq9UqTaJJUm
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 4840 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation GOLAYA-SEXY.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.ini GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\1.txt GOLAYA-SEXY.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\1.txt GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs GOLAYA-SEXY.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day GOLAYA-SEXY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLAYA-SEXY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings GOLAYA-SEXY.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2644 4260 GOLAYA-SEXY.exe 82 PID 4260 wrote to memory of 2644 4260 GOLAYA-SEXY.exe 82 PID 4260 wrote to memory of 2644 4260 GOLAYA-SEXY.exe 82 PID 2644 wrote to memory of 4840 2644 cmd.exe 84 PID 2644 wrote to memory of 4840 2644 cmd.exe 84 PID 2644 wrote to memory of 4840 2644 cmd.exe 84 PID 4260 wrote to memory of 4272 4260 GOLAYA-SEXY.exe 85 PID 4260 wrote to memory of 4272 4260 GOLAYA-SEXY.exe 85 PID 4260 wrote to memory of 4272 4260 GOLAYA-SEXY.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"C:\Users\Admin\AppData\Local\Temp\GOLAYA-SEXY.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4840
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs"2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
679B
MD51e13b9527a12dffe2998bf760c127814
SHA1aec14d10a204872cc940550fa7876b2081373f01
SHA256355dafd0f4053c07306b5505a4a5333ad4f2afb79a1d5fd35798282bdac79c38
SHA51216e2d3e546030a7d452455f170ba731484006e6b645cc201b854ec11d115ce6182602e5a18a74859f5fdff7dda4939e30dbb5abe6313388e556784879a2e425d
-
Filesize
53B
MD5458f8278e6db63a24dd7874915404c05
SHA12a8b5a312231a4fcd88db0b23c91bb504d35b9b0
SHA256c802072462fcfd13b9410d839530c95e3ec526cac9fe273a35a78312d436817d
SHA5120b05dca8f971df3e5bce2a461455117b6052cfeca3d646bee6c66d3c6c69be31b9d98228cf1c6cb972856c90889aab6f883d25c6e5a6292f17fc12505af9cc50
-
Filesize
189B
MD54916a96fa815d608e91d931df33122f9
SHA193a9849116673ad184ca7a5f32d0bea2d30762a4
SHA25619ba1285b426e131f629eb1afddbe1350c71dc6188cd14779bb65123cb7a728f
SHA51278a73b8879cd3179dbdf7a4a2805659b20efacf1a090c64c875e8915a297c17cde9165f9da0a4ad70abc11745c61d824e047e0e3ba8e2e587ca1b1011b2f9ca7
-
Filesize
1KB
MD50715369b6dd1face650d3625223bf4db
SHA1788a33cc2fac1697fd265c57448e5618d1c438d0
SHA256492f2286987ba02fd03a735d89126254b540f140e2ee07f7d1c3481a1d422f30
SHA512200fdc5e01cb26602e134bf3b0474dca2c0e1a85c2505240a76094782b893355a18249549165a06228d6663146a4b992b249e321e31d1364bf381c075d896d99
-
Filesize
1KB
MD5435d5b9ac8adeb9d27fad84bf5303c6b
SHA1bde744ec28854dae3189115a948db25c2e21a886
SHA2568c2c870afff5c4585252a9bc7675674b5756f316bb2bd0d63c09ee07972ea411
SHA5124460ee340753053374c72342d5f0878fc30a1f10d4cbde5b55440932479ab35d42487af08a27703dcf06dedf875b25ec9a888974f8adeee3243afd2f9425cb8e