Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:17
Static task
static1
Behavioral task
behavioral1
Sample
f4ccf3d32f438869e6a518ec970e0724b52abd3a39a4c2891fa3c2d3a4835a6e.bin.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f4ccf3d32f438869e6a518ec970e0724b52abd3a39a4c2891fa3c2d3a4835a6e.bin.dll
Resource
win10v20201028
General
-
Target
f4ccf3d32f438869e6a518ec970e0724b52abd3a39a4c2891fa3c2d3a4835a6e.bin.dll
-
Size
93KB
-
MD5
809a76a64875aeede09f7db28a2333a9
-
SHA1
97a52181f6907f8aaacae0bec013fa50b8706cec
-
SHA256
f4ccf3d32f438869e6a518ec970e0724b52abd3a39a4c2891fa3c2d3a4835a6e
-
SHA512
d3f9a3b9881c00a9d22d877a60faf511feb7a59eec87735836d58d5ec0a17a7eee7d9115cbfb7f3595ea5a500e3bcb7dba7d425260e913f5c67e5542b40286cb
Malware Config
Extracted
C:\ProgramData\Microsoft\MF\F5391E-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Users\Admin\Desktop\F5391E-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\1033\F5391E-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rundll32.exedescription ioc process File renamed C:\Users\Admin\Pictures\FindAdd.png => C:\Users\Admin\Pictures\FindAdd.png.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\WatchRename.png => C:\Users\Admin\Pictures\WatchRename.png.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\RenameConnect.tif => C:\Users\Admin\Pictures\RenameConnect.tif.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\OpenEnter.tif => C:\Users\Admin\Pictures\OpenEnter.tif.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\ExportGroup.png => C:\Users\Admin\Pictures\ExportGroup.png.f5391e rundll32.exe File opened for modification C:\Users\Admin\Pictures\DisconnectMeasure.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\EnterRequest.raw => C:\Users\Admin\Pictures\EnterRequest.raw.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\FormatSend.crw => C:\Users\Admin\Pictures\FormatSend.crw.f5391e rundll32.exe File renamed C:\Users\Admin\Pictures\DisconnectMeasure.tiff => C:\Users\Admin\Pictures\DisconnectMeasure.tiff.f5391e rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 7479 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLADDR.FAE rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zurich rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7FR.LEX rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\FUNCRES.XLAM rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Chisinau rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBRPH1.POC rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200611.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe Root Certificate.cer rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\TITLE.XSL rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.xml rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21512_.GIF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings.nl_ja_4.4.0.v20140623020002.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287643.JPG rundll32.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\F5391E-Readme.txt rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\feature.properties rundll32.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\F5391E-Readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02075_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00921_.WMF rundll32.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01368_.WMF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+1 rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_ja.jar rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\SY______.PFB rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base_4.0.200.v20141007-2301.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0281638.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\3difr.x3d rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\BUTTON.GIF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-attach_ja.jar rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-awt.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE06450_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02466U.BMP rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\TASKDEC.CFG rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Cocos rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105232.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR40F.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105368.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238333.WMF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\dblook rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR12F.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Apothecary.xml rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Riga rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_ja_4.4.0.v20140623020002.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\REC.CFG rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageSlice.gif rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\CAN.WAV rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\rtf_underline.gif rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host_zh_CN.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\LAUNCH.GIF rundll32.exe File created C:\Program Files\F5391E-Readme.txt rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-openide-util-enumerations.xml_hidden rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21326_.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialMergeLetter.dotx rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanResume.Dotx rundll32.exe File opened for modification C:\Program Files\Java\jre7\lib\resources.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101980.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241781.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00932_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21343_.GIF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\utilityfunctions.js rundll32.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html rundll32.exe -
Suspicious behavior: EnumeratesProcesses 216 IoCs
Processes:
rundll32.exepid process 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe 288 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 288 rundll32.exe Token: SeImpersonatePrivilege 288 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 288 wrote to memory of 3964 288 rundll32.exe notepad.exe PID 288 wrote to memory of 3964 288 rundll32.exe notepad.exe PID 288 wrote to memory of 3964 288 rundll32.exe notepad.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4ccf3d32f438869e6a518ec970e0724b52abd3a39a4c2891fa3c2d3a4835a6e.bin.dll,#11⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\F5391E-Readme.txt"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\F5391E-Readme.txtMD5
fef22b66ca6ef4783460c6c75db77d3f
SHA181bc76a4264975b35365b12d117bbe4ba936ea02
SHA256c355131e45b83d6e8fb6906306de4343e3be988365694f44d5184b32cea4f86e
SHA512512fc75706214939e55af5a18c2bb4ac03849338a0dc116e8aa7564da4153f135288503e55205aa6485b2404ebeca72e28a81bf0895624223d2690d02d7fb33f
-
memory/3964-0-0x0000000000000000-mapping.dmp