Static task
static1
Behavioral task
behavioral1
Sample
ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe
Resource
win10v2004-20220414-en
General
-
Target
ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe
-
Size
54KB
-
MD5
12a470956f7437a00d7bcf47f1995ea7
-
SHA1
7301382916d9f5274a4fb847579f75bc69c9c24b
-
SHA256
ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6
-
SHA512
3e0ed7030507d076f0578071c9a628aa625ab2bbe0134ad49634d1f72de4ddf42cb02652f6f3b3378ec1e842f109be1cc68334585a46c275c5be3e2d7a685c61
-
SSDEEP
768:VnJ4r+7qF+ptC7j/zz6GGGqojEr3e8ADPTO87NTx9R1GjAKxpK1Wd:T4S60ty2XGD0A7rxekMX
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6.exe.exe windows x86
59ea8367e2bed37cb46ec07cc90d09a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpyW
lstrcatW
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
WriteFile
CloseHandle
MoveFileW
GetCommandLineW
FindClose
FindFirstFileW
GetProcessHeap
GetLogicalDriveStringsW
SetErrorMode
WaitForMultipleObjects
ExitProcess
CreateThread
GetComputerNameExW
LoadResource
LockResource
SizeofResource
lstrcmpW
lstrcmpiW
lstrlenW
FindResourceA
GetFileSize
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
HeapReAlloc
FindNextFileW
HeapAlloc
user32
EnableWindow
GetSystemMetrics
UpdateWindow
SetActiveWindow
SetWindowTextA
SetWindowTextW
DestroyWindow
IsDlgButtonChecked
MessageBoxW
LoadCursorW
CreateWindowExW
TranslateMessage
GetMessageW
wsprintfW
RegisterClassW
CheckDlgButton
SetWindowPos
GetWindowRect
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
GetWindowTextW
DispatchMessageW
gdi32
CreateFontW
comdlg32
GetOpenFileNameW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHBrowseForFolderW
mpr
WNetUseConnectionW
WNetAddConnection2W
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ