Analysis

  • max time kernel
    174s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 01:37

General

  • Target

    03dd22c542d2555bf0650df2434079d314e5d311762d778b612f03327b2058e8.ps1

  • Size

    5.1MB

  • MD5

    ee48f5cc6e8e953361db80dcf1c30445

  • SHA1

    c400de9be89e17b57532ec003e404941f95e358b

  • SHA256

    03dd22c542d2555bf0650df2434079d314e5d311762d778b612f03327b2058e8

  • SHA512

    47bc33530d37dfcca2169257afe4a743823dec4d096373063f6279f3989af08759b43f83c567a13f5658ac58c9d924a26439dffb8cec63130190324741dc68fe

Score
10/10

Malware Config

Extracted

Path

C:\1D1F10-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .1d1f10 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_1d1f10: NgCqJ6TaoQwlbp0Huf93Wxki/Y7+LaAC5FwYTP7o2bZflSIrYe 8UR7j940wESC0dIhe6+uFk3patunSfJpyk1waL4PQKpCpfhq4K /iulCeM4M3FpMQqGSbNCBgGseJFwOrWsZsHYv76PdRZdIxUvwU 0rwv+3wp55GVtKA2p4wToPXOEg/rXEOoMOn+cV5Bz+2N9U0xpz CUEGp1W9PHzwjXJb31AXengashM7DE130bApIYky7cdv61Go/J 9dv0byYK1V90rl9yYGFFSaJEyogn0VX+SILnl90w==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\03dd22c542d2555bf0650df2434079d314e5d311762d778b612f03327b2058e8.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wdom5imk\wdom5imk.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE23.tmp" "c:\Users\Admin\AppData\Local\Temp\wdom5imk\CSCB6A16AA8D46547CF89F24F203E14ADDF.TMP"
          4⤵
            PID:2244
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xag05t3m\xag05t3m.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3032
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC95E.tmp" "c:\Users\Admin\AppData\Local\Temp\xag05t3m\CSC1B48D02537E948D9A48F3C49B431E373.TMP"
            4⤵
              PID:4068
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
          PID:5472

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RESBE23.tmp
          MD5

          50e624c1524cbaa692f3e361d9af79ec

          SHA1

          d54cdade3e229c9e3b76f4a1192b36824266173f

          SHA256

          7da6fa40b0dc2c7c4bd5ddbb83a16107c88de3350ca3f60d856612e272c19be8

          SHA512

          df5ca8d845adeef05a6d9aa65a3ebf34baf66f65c9020e9294252438d4b5d7ee67f79663e04c57e3fc10a7059f78669a9f5443089dd950e9183cc75f1bc929f2

        • C:\Users\Admin\AppData\Local\Temp\RESC95E.tmp
          MD5

          f4d10dbf236fea4781c552f839d58be9

          SHA1

          43bc51f390a934bf039690d39baaae9917e32648

          SHA256

          ebef5f704d3778377f9cc4a24e89d82336b4824b7a14198644ffc9fa8322dbac

          SHA512

          3ad82ed96ce1fd96e533380a4f2c90d3df5c0d71b4caf7589977180056163d148529a6d96c9644b49f6f145ddfd609b5e47934e6c150bfd6a73512b7f99140ed

        • C:\Users\Admin\AppData\Local\Temp\wdom5imk\wdom5imk.dll
          MD5

          993da9358d0175cf2b9a6bf2cc9ee09a

          SHA1

          113db6d94d87d975bbd4e5e5977557f6791d5ca5

          SHA256

          8d2bf6b627a645ad6a37bfe829de90cda11f1becc7769d2713baf59df31c4b67

          SHA512

          f4cc388441d0cdc43970590b6a118fcf98a44859f688ac7a8c5f1b5d4edc0d4e95821b5c1ce1bcea59c4a6eb884485a1e008b73d0b0aec8e85fcffe94c26f3cc

        • C:\Users\Admin\AppData\Local\Temp\xag05t3m\xag05t3m.dll
          MD5

          d1175e85385d7a5d3bf7f887fb502c54

          SHA1

          cefd259e6cc893f99505708610b8e426739261b3

          SHA256

          3d36b17e44eeb9e0ea7c198a33d84a0e0cee1f4fee5a23c868ef75c7242ecea8

          SHA512

          7fa47536b8c70f64e939e0d3941f8a62915abef237693ddbe60d5c1219428a17e6b759367ebe3951bc08b668425fe52e1e0b1160effee0717d35fb039d4b697e

        • \??\c:\Users\Admin\AppData\Local\Temp\wdom5imk\CSCB6A16AA8D46547CF89F24F203E14ADDF.TMP
          MD5

          6f863945588c71adfd7e6589a803910a

          SHA1

          6cb01d47f100eafe241450a8e9005bf26f8395f6

          SHA256

          82a283d0dacadba0c6e6d3db10a8ba0f548d5c9e0c768bb0b8033afc58b82e01

          SHA512

          2e895e46a6c280f9ff03264b9812134db2203f9d841e07697dde3498e5b5552f5c477ef586af8ee0d62fa4f00c77570094e66738736359694946f2a45826e909

        • \??\c:\Users\Admin\AppData\Local\Temp\wdom5imk\wdom5imk.0.cs
          MD5

          180af0be87527cb58da22854cf83e457

          SHA1

          38da4b3f799109c64e39620c1f7254a75bcecbaf

          SHA256

          442963575807f914403c44d8df40be923d106e6c779c2fb89710bf414a918179

          SHA512

          bbb6be622759b847a96a7f73a3f228de4608035e459270009652f8aa09dad5007a062314b33bbcc5621e6a847c187c8c1702a0c47e8d0428afbd856cd7ad85fe

        • \??\c:\Users\Admin\AppData\Local\Temp\wdom5imk\wdom5imk.cmdline
          MD5

          af51c6dd9dfa6efe6907631ca3298108

          SHA1

          5f9b4efffe51e335d1f3bf1fa33b351d28dc437c

          SHA256

          fd600207dabdf77d678e90018893426350ec2d7c89bff7793396f92d37f05b92

          SHA512

          1875e8bbabf98ac59a55980104d6f7c7ad9a1bb8ff9010d5f54aa4be9da52d539acdb097666354a64e26327984e928417b583a5b4bb98503c685a4e1f140d20e

        • \??\c:\Users\Admin\AppData\Local\Temp\xag05t3m\CSC1B48D02537E948D9A48F3C49B431E373.TMP
          MD5

          63c6be70ed5c5d2d01f6e0d2ac3a872f

          SHA1

          1362ff735cf8185b391f7c782a10d80b4725cef1

          SHA256

          b8967781867bb64f72610b1e58cfe969de3fb6a90d2575c7b85ba8d0583da54f

          SHA512

          7ca4327fc620cf50355366a1a07b5b08f38e49d5b33374a9a2e5216733817deea57825e60896ab817e883a005562e8c23d1f88c3f8ece763e5f18ca8640f2bee

        • \??\c:\Users\Admin\AppData\Local\Temp\xag05t3m\xag05t3m.0.cs
          MD5

          ed9cfd99d64d4145f95494e644387917

          SHA1

          b1aabfa9b9e8723ce97429c4716c872e83f4f27b

          SHA256

          7e0a1c0195e236ff415d7855a4a63c92128da1c2072c5b31176709d61f8b3ae2

          SHA512

          55acabe1038c18f637a19081f61946e60bb053ff1e98ab5c2dada90e7440443cc76145268a9ef01710f548cda2a61581948218e674bc9a566b43f31e914b29ac

        • \??\c:\Users\Admin\AppData\Local\Temp\xag05t3m\xag05t3m.cmdline
          MD5

          57dcfb174fc20c91d6a4996f1a9962c8

          SHA1

          34586f968ff3671cd0f301fecaf9ff999888a106

          SHA256

          0ffa0a25797d3af79790cd08b0d52cd899e8671f9c4b979c8dddf18136e9cfc2

          SHA512

          1b56ee921d2c47530235af52640301f78c2b12d71590b51277d219d88bd1bc2c29fa0726fbffef86d43b44fb6cb036571a9c1b7e137f5cc9023fd32c50b9aa40

        • memory/872-139-0x000002181EA86000-0x000002181EA88000-memory.dmp
          Filesize

          8KB

        • memory/872-134-0x000002181EA80000-0x000002181EA82000-memory.dmp
          Filesize

          8KB

        • memory/872-135-0x000002181EA83000-0x000002181EA85000-memory.dmp
          Filesize

          8KB

        • memory/872-136-0x000002181F610000-0x000002181F632000-memory.dmp
          Filesize

          136KB

        • memory/872-151-0x000002181EA88000-0x000002181EA89000-memory.dmp
          Filesize

          4KB

        • memory/2496-152-0x0000000003400000-0x000000000341B000-memory.dmp
          Filesize

          108KB