Static task
static1
Behavioral task
behavioral1
Sample
6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f.exe
Resource
win10v2004-20220414-en
General
-
Target
6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f.exe
-
Size
54KB
-
MD5
057d8c68bf4ce08bda3f9bd96c04bd25
-
SHA1
60428ec831ff15fe3e5019e8517af06da1196b96
-
SHA256
6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f
-
SHA512
87a48943600a1d5782edaf76fd422d3d66e571a2f907dc99dddded81e25275b8fb332e04f79078d90d2a7abcdcc95c7dc10244ef91c3f272b9bbbbd180db17a4
-
SSDEEP
768:OnJr+Opk+ptC7j/zz6GGGqoSEr3e8TDPF+87IKdNMAkRj7kTFx:aS10ty2XGy0T7BdERju
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
resource yara_rule sample netwalker_ransomware -
Netwalker family
Files
-
6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f.exe.exe windows x86
5b31ac8cdf313aa6e4513e902c6f0c0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpyW
lstrcatW
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
WriteFile
CloseHandle
GetCommandLineW
FindClose
FindFirstFileW
GetProcessHeap
GetLogicalDriveStringsW
SetErrorMode
WaitForMultipleObjects
ExitProcess
CreateThread
GetComputerNameExW
LoadResource
LockResource
SizeofResource
lstrcmpW
lstrcmpiW
lstrlenW
FindResourceA
GetFileSize
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
HeapReAlloc
FindNextFileW
HeapAlloc
user32
EnableWindow
GetSystemMetrics
UpdateWindow
SetActiveWindow
SetWindowTextA
SetWindowTextW
DestroyWindow
IsDlgButtonChecked
MessageBoxW
LoadCursorW
CreateWindowExW
TranslateMessage
GetMessageW
wsprintfW
RegisterClassW
CheckDlgButton
SetWindowPos
GetWindowRect
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
GetWindowTextW
DispatchMessageW
gdi32
CreateFontW
comdlg32
GetOpenFileNameW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHBrowseForFolderW
mpr
WNetUseConnectionW
WNetAddConnection2W
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ