Analysis

  • max time kernel
    158s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 20:17

General

  • Target

    573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe

  • Size

    91KB

  • MD5

    457a4ba6896e15e132cc084cb6cd7a80

  • SHA1

    e79fc10dcf685be830578d09cb8ea2894b1d280d

  • SHA256

    573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d

  • SHA512

    115bff1f55a14064e0deae457cfb3bf989f85091972dd30a207fde9f76a7bea19f5c689c2f5d5feccc1ee52d2e3a72dde159b2eb38bdac845d07ac0726d00104

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\User Account Pictures\4F6CA-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}
Emails

sevenoneone@cock.li

kavariusing@tutanota.com

Extracted

Path

C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\4F6CA-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}
Emails

sevenoneone@cock.li

kavariusing@tutanota.com

Extracted

Path

C:\Program Files (x86)\Microsoft Office\Document Themes 14\4F6CA-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}Hi! Your files are encrypted. All encrypted files for this computer has extension: .4f6ca -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised, rebooting/shutdown will cause you to lose files without the possibility of recovery and even god will not be able to help you, it could be files on the network belonging to other users, sure you want to take that responsibility? -- Our encryption algorithms are very strong and your files are very well protected, you can't hope to recover them without our help. The only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypt program, you may damage them and then they will be impossible to recover. We advise you to contact us as soon as possible, otherwise there is a possibility that your files will never be returned. For us this is just business and to prove to you our seriousness, we will decrypt you some files for free, but we will not wait for your letter for a long time, mail can be abused, we are moving on, hurry up with the decision. Сontact us: 1.sevenoneone@cock.li 2.kavariusing@tutanota.com Don't forget to include your code in the email: {code_5f9d9c92_4f6ca: Gjwm6fIFIkhhWL91IA2RazHhOx8xHrs5Hh5r9DcIrCyOWAsJFm VhYAdViDrf659aaKxfH/wIVPm4GZw7EBHZIFffeIrgX3EXkpyd X7tIByd+sE8Y1jBONLUeyChgT1WKn2Pn80o5jmFPEqxrI0AHS0 tuus/i0pKw1zGZOipUVQ7eng4S1gW/DdUMuN881c3+ivn6PO/l XWwRS5urblEaRjwaaAD2dEIbTa02ZZpJrH3S/ZSLWSy2gQRdFq VI3lMyeVOjZjw4D4AnjL2Llt7lkoqh2KQ=}
Emails

sevenoneone@cock.li

kavariusing@tutanota.com

Signatures

  • Detected Netwalker Ransomware 2 IoCs

    Detected unpacked Netwalker executable.

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 7472 IoCs
  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 16692 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe
    "C:\Users\Admin\AppData\Local\Temp\573873b7b2fbb390ff21bb4e986f69fa25a1f3eea2c5fe446d46c186ab92257d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\system32\explorer.exe"
      2⤵
      • Modifies extensions of user files
      • Deletes itself
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:1476
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\system32\explorer.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\system32\vssadmin.exe
          C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:1796
      • C:\Windows\SysWOW64\notepad.exe
        C:\Windows\system32\notepad.exe C:\Users\Admin\Desktop\4F6CA-Readme.txt
        3⤵
          PID:7244
        • C:\Windows\system32\vssadmin.exe
          C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
          3⤵
          • Interacts with shadow copies
          PID:7280
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:1788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Modify Existing Service

    1
    T1031

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\4F6CA-Readme.txt
      MD5

      d42fab76984b6feded489a515487b3d3

      SHA1

      13d9e2ae5ee9898148f425214f13832a2b3ddf59

      SHA256

      7d4d054411ea70d42729baf0f9e77c1be54c635d990aee953c2d0266fb4096fb

      SHA512

      953561f1d19b0f25aff9a27bb976ea82930a055a78bd7ec4c4afe3495a2b62325e2ca75e049a227c1bd704e90425128119fd014296658883035f928f5ba61621

    • memory/1444-0-0x0000000000000000-mapping.dmp
    • memory/1444-4-0x00000000001B0000-0x00000000001CB000-memory.dmp
      Filesize

      108KB

    • memory/1476-2-0x0000000000000000-mapping.dmp
    • memory/1796-5-0x0000000000000000-mapping.dmp
    • memory/1852-1-0x0000000000070000-0x000000000008B000-memory.dmp
      Filesize

      108KB

    • memory/2004-3-0x0000000000000000-mapping.dmp
    • memory/7244-6-0x0000000000000000-mapping.dmp
    • memory/7280-8-0x0000000000000000-mapping.dmp