Analysis
-
max time kernel
175s -
max time network
32s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9.dll
Resource
win10v2004-en-20220113
General
-
Target
26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9.dll
-
Size
57KB
-
MD5
5c26c665fc66b914e2e3d9114e23256f
-
SHA1
81dd2a490042854dbbc3cf3cfef47617c9933457
-
SHA256
26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9
-
SHA512
995b3ae4be60a5b51577d731910ef587d7ff8937e735b6615d15be7f48a8e5c8dbece0212c71ad61f5dfaaabb835add46114c482c3394d5c79ac81a9b74a30fb
Malware Config
Extracted
C:\7E950A-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SuspendTrace.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\SearchResume.tiff rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN111.XML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCAL.DPV rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00037_.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SendMail.api rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7jp.kic rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\VOLTAGE.WAV rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Elemental.thmx rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199549.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BRCHUR98.POC rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00038_.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\MSO.ACL rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\MSN MoneyCentral Investor Stock Quotes.iqy rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendtoOneNoteFilter.gpd rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.LEX rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN092.XML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0301076.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGDOTS.DPV rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\v8_context_snapshot.bin rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoDev.png rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.CN.XML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04195_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00152_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\EUROTOOL.XLAM rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0234657.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199727.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\YEAR.XSL rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeAUM_rootCert.cer rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0297551.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\TURABIAN.XSL rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04332_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00161_.GIF rundll32.exe File created C:\Program Files (x86)\MSBuild\7E950A-Readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\powerpnt.exe.manifest rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN107.XML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN03500_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT rundll32.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\7E950A-Readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.GIF rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Accessibility.api rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN110.XML rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sr.pak rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zy______.pfm rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mspub.exe.manifest rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0212219.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0230876.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\acro20.lng rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Real.mpp rundll32.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml rundll32.exe File opened for modification C:\Program Files\CompleteSwitch.vssm rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Module.thmx rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd.otf rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00194_.WMF rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\TALK21.COM.XML rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\COUGH.WAV rundll32.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\7E950A-Readme.txt rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALENDAR.DPV rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08773_.WMF rundll32.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SegoeChess.ttf rundll32.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\nl.pak rundll32.exe File opened for modification C:\Program Files\EditCheckpoint.aiff rundll32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe 320 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 320 rundll32.exe Token: SeImpersonatePrivilege 320 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27 PID 804 wrote to memory of 320 804 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\26a406f910570e67858db0eb713b135a98bb00856ba05cf8d4ad54233a9196a9.dll,#12⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-