Analysis
-
max time kernel
152s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7aac112635cbde748a97b38f6a52aaebbc3f0050f81cf36ccdc6c294c214fd73.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7aac112635cbde748a97b38f6a52aaebbc3f0050f81cf36ccdc6c294c214fd73.ps1
Resource
win10v2004-20220414-en
General
-
Target
7aac112635cbde748a97b38f6a52aaebbc3f0050f81cf36ccdc6c294c214fd73.ps1
-
Size
909KB
-
MD5
23296cd80227f6ca6d00221d42c1c7af
-
SHA1
72cfda2bb3914e5696c7f233daa515a2028ab2ef
-
SHA256
7aac112635cbde748a97b38f6a52aaebbc3f0050f81cf36ccdc6c294c214fd73
-
SHA512
68778a1c82b7ad2aeea4d4436ff37de5034bb234185c52c729561606f71b04548cdb1c08051580faf3838b815f0f832e6a1124d68c0d54fb4eec7d782275fc2f
Malware Config
Extracted
C:\ProgramData\Microsoft\User Account Pictures\C49A25-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\OpenAssert.tiff Explorer.EXE File opened for modification C:\Users\Admin\Pictures\CompareCopy.tiff Explorer.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18191_.WMF Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\vlc.mo Explorer.EXE File opened for modification C:\Program Files\GroupRename.vstm Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Perspective.thmx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRMV.XML Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\+Connect to New Data Source.odc Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Training.potx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD10289_.GIF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_K_COL.HXK Explorer.EXE File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\C49A25-Readme.txt Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_resources14.xss Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Contacts.accdt Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanLetter.Dotx Explorer.EXE File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\README.TXT Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0185604.WMF Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.log Explorer.EXE File opened for modification C:\Program Files\Windows Journal\Templates\Music.jtp Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyMergeLetter.dotx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Origin.thmx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryLetter.dotx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GROOVE.HXS Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0186002.WMF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Pushpin.eftx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Newsprint.eftx Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\vlc.mo Explorer.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\external_extensions.json Explorer.EXE File opened for modification C:\Program Files\Java\jre7\release Explorer.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0196374.WMF Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\vlc.mo Explorer.EXE File opened for modification C:\Program Files\Windows Journal\Templates\Memo.jtp Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\QuizShow.potx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18201_.WMF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryNewsletter.dotx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195812.WMF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD10358_.GIF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Flow.thmx Explorer.EXE File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Thawte Root Certificate.cer Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\subscription.xsd Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\PAB.SAM Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02077_.GIF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0196400.WMF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Thatch.thmx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACC.OLB Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_COL.HXT Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\vlc.mo Explorer.EXE File created C:\Program Files\Java\jdk1.7.0_80\include\C49A25-Readme.txt Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\CalendarToolIconImages.jpg Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\vlc.mo Explorer.EXE File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME.txt Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OL.SAM Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanPhotoAlbum.potx Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199755.WMF Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OMSSMS.CFG Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB00531L.GIF Explorer.EXE File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\C49A25-Readme.txt Explorer.EXE File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ant-javafx.jar Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.CN.XML Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0149407.WMF Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\FreeSans.ttf Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_fr.dub Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.LEX Explorer.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSTH7EN.LEX Explorer.EXE File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\vlc.mo Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 844 powershell.exe 844 powershell.exe 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 844 powershell.exe Token: SeBackupPrivilege 1664 vssvc.exe Token: SeRestorePrivilege 1664 vssvc.exe Token: SeAuditPrivilege 1664 vssvc.exe Token: SeDebugPrivilege 1284 Explorer.EXE Token: SeImpersonatePrivilege 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 844 wrote to memory of 1208 844 powershell.exe 29 PID 844 wrote to memory of 1208 844 powershell.exe 29 PID 844 wrote to memory of 1208 844 powershell.exe 29 PID 1208 wrote to memory of 2036 1208 csc.exe 30 PID 1208 wrote to memory of 2036 1208 csc.exe 30 PID 1208 wrote to memory of 2036 1208 csc.exe 30 PID 844 wrote to memory of 2032 844 powershell.exe 31 PID 844 wrote to memory of 2032 844 powershell.exe 31 PID 844 wrote to memory of 2032 844 powershell.exe 31 PID 2032 wrote to memory of 2004 2032 csc.exe 32 PID 2032 wrote to memory of 2004 2032 csc.exe 32 PID 2032 wrote to memory of 2004 2032 csc.exe 32 PID 844 wrote to memory of 1284 844 powershell.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies extensions of user files
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\7aac112635cbde748a97b38f6a52aaebbc3f0050f81cf36ccdc6c294c214fd73.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\7dfnnzc3.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB84.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8029.tmp"4⤵PID:2036
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kq9cl3jo.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC728.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC727.tmp"4⤵PID:2004
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d74e125742b6ca0b19ffd3b58b960841
SHA178584c072362d8de60e817310f287268d58264e4
SHA256b2e772d0f1e0794dca8bc7d21e10ef762c3f816a849808347b2a6edf10b7cf04
SHA512929a644a9ef35903d24ed3ca6b1492389565b400440c5e56f46bad161338bc4b0801de7b37e32bd44cae945c0b36d5d9bf8289bb1140fd0eae64a4ff501f2d7d
-
Filesize
7KB
MD5387f969194eb2aa6a3aaa760900debf7
SHA1a7b973ae6c8041c3ec4b9e7f42572b53f71c7317
SHA256596fc75e3a6f6417b41ccc2ebe1ad07ca7d88b50c07822d710048dd7df3702e0
SHA51226970b6fd204e2bc2b91b01b4e7438c236d0dfb00edf904b8085a3481465fa9440015f6e9d7079180ed54d5c01828dadce4ebf595bdacb01bcede52bdae7521a
-
Filesize
1KB
MD5caa09151fd7d25034e5765a8431b909b
SHA1af51de94ebffebbd1a85687b0f7c8e2a61ea398b
SHA256c1e0bc669bba8e79feca985351db02f4d9d4cc2d17b4817a92fcd0df59d98475
SHA512cce9681cb588d27bf02ead94a9793ee909e8cb58fb23f510c6361529b8403441e5221521a651ce2ed2247db203901e850bc85db279d033d26fa185903733b792
-
Filesize
1KB
MD5ff8cc1ebf5fb894262d3f20033600f49
SHA16e4170cfd8f62a7b84586ca08a417e1c0fb8b908
SHA256dc3500c17e1841fbb9f43ff538a19b02240fc08c8cb066d671f19ba8f0e5f13e
SHA5125bf952854b887cbe321a658ecd7458483382741da8e87b101aba1662c94f0dea6daeb2fa8b54578b42f877b6ea91836f3ce67072e565d27f9bffcc8c58a9c2c3
-
Filesize
4KB
MD551b3c7b96353430b621927b28d4cd276
SHA15d3433b450c16def2745f558e6b8806c7a64cdcd
SHA256e818de3c78df2587e1dbb3c1293f01a6082f275b5b1138e98b965f3bc743fc1c
SHA51208d5d9558bc0ea94b8cf97f516e437c3d571f8fc880bfa29d4402304d53d2fff236325a761247aeb1f6027bdbcefa9d1abf2fa38c887acc7fd43f3e629970a7b
-
Filesize
7KB
MD5a60f550cd44840c11f036c579767a9f9
SHA1cce13ac22fed81bae50705d018af3b7499bcd6f1
SHA256c65ced762cae38e10f5834a4139c30e751dbb04c2d505d97d7d34e793b0d3d47
SHA5126d24b8f519a8c8d2337aee7a6747dee203b252f93140c79f15f46087eb4d06724b99e858184b0693664713f13523ed70473315a5d2ee03268afeaa352bcc80b0
-
Filesize
8KB
MD5adb821d681853bdb5f96815a435533c3
SHA1f10358ae09199affc58a4c4b9b31677612252762
SHA25642fd2b1e45721ff7f27ec7ba2f9fd7840f03d38442da3fbf25ea687c4e5fcf68
SHA51214f6a680c227635e826b5e3b6b843b95d4b02f2a99581e9d67cf53fe4d08dae1217f6ecc42c2ac1409887e3b88fc65c0589b06beeec80dfb5441ca117a58777e
-
Filesize
309B
MD5133a9e79ccddc747ff7572fdf1154623
SHA101240af87022b75c3c22ee6ff2dceadcc7772a3e
SHA256edc7692f5ae7cb8b11beaaa4d5a6671b79312c85e03aaf93c0577b2d379aadcc
SHA512a36513f9d82b5b72cc1e4a26fd94b001bf295a4006dcd9bdb1be6edafb9e131431063aa5a247efd0a14b21529b70097ecfec9fb5256ee7de6f19e2c6c7572fed
-
Filesize
652B
MD5978bf5ed243e4625ee4fd90d9ebe70e3
SHA150934214c325c2764e40efdb9a0cea899dde25c3
SHA2561598132d987bd574523caf9fa4040036bd8ff82db41cca40d29a8128be784d50
SHA512310485daeaa97df9ccd92fcf269e937a57c60cc6674a64f57bea5cab96c92d32fe237269b3d2a707ef8b240094ed7cccc5680fa3bc4c1da6345f6aff4bdfe3ee
-
Filesize
652B
MD5385275ab93f7879081635c4a7c940b2a
SHA19637d485a627cae4d5bac54c712a32432367b039
SHA2569646b0a72b2d7442ee8ea9a8dbd505865b0736e3944d9bf1f132f129af956ee8
SHA51298f1087262b2992b5ce62f4bf20b93db26097db8876831f812c3801555a3b16cd351391f1e2028d7eed92b23b07776dde5dee3b8279a1b0298cda52c265ff631
-
Filesize
2KB
MD5aefa890f6d791978020f664840a0e823
SHA10c6fe24d21f924ae96244b34fb0581bdede8f3b4
SHA2569590adbe5616b3efb6439412a0fd56f95cad0264467735846457f914abcd940d
SHA5126fe262134fc58d8ef3d3fd8fcf5695e0e7957d14e35915fc6d78abf677f13fe73c22d5950e6c6a6acaab3b02002250647b58ed826d1a7bdbe6f3068fa1ccb0ea
-
Filesize
309B
MD532d9f9fd6684aacfd2c20cb44670707e
SHA103c7ff2399a9edd09c3b5724d7f8982037310286
SHA256d26900142ac17f7bd2187d136ee5c08fb0288cde2441a5cea71fe83fc1896e56
SHA512a3a92464a3c8d33c8e1c8941f638e05332d5e131ca46874e9ecb780773e28196f5e238d309391bca8c9a7f538e311379e01bf17fb51f8ca40ebbe2baabd27d71