Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 12:42

General

  • Target

    winbio.exe

  • Size

    69KB

  • MD5

    2edbacd070d1949bb5d97d3a6e4e23f6

  • SHA1

    761168968a1d951848a36ad428ee4d05153f1e01

  • SHA256

    8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc

  • SHA512

    a4b282b8c91124a6dc465573842a03b5fcf346af6e561eef66ea405fcb784251044e2f8a2c0a61cbb0e29f7efc02a71d131930b70e2c021978d00c0b3c38f344

  • SSDEEP

    1536:juCWRxL7hbUiQfovecnXUU+hhOZuIWiFp+ZfaBZebC33O+MEYTb:KCWf7VJQfmeMXvkhOZu1iFBBZebC3+

Malware Config

Extracted

Path

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\4D0BA2-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .4d0ba2 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_4d0ba2: lt2SUsvQdoFE2tRFCBF4DpuFC0K8budXqFxgIdNnzUp1wjC1vD euhvbzuChIxRW0K1L+VCyPCAS5k0KusB9gr7mjPoy1whlZq/a6 0qqP4Ih/UIX0C/wrlfpFtzN3dw4lCAj1mzBjlgLe6B+WfhCOJh xvuwaIbSi3+DECHBdnlw3kYF/30jG9BMFb7cQacMPCszeQWvKl 944LEKUfEPPkaeD/evhXAR/RzzTTZShPYF0sYo1uc3Z4PVX0A3 jXSFPW4wnkGOSy+b/fMYSgYheb/Q+LnzUhZSUiCA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (7394) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\winbio.exe
    "C:\Users\Admin\AppData\Local\Temp\winbio.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:2872
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\4D0BA2-Readme.txt"
      2⤵
        PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\D430.tmp.bat"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /PID 2300
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4836
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:7804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\4D0BA2-Readme.txt

      Filesize

      1KB

      MD5

      9f2dbecd905ff44c8778e0aa57ebdb3b

      SHA1

      9075a79800fba1e94d692c3586b67991091d033e

      SHA256

      ec55755ec9b888a5a440d9d52ffd0d482472ebabb89c532fa5fc6c64b8816d07

      SHA512

      d9710cee8bd8e15056ce342133e9762fdc1a93c49accc05e90f5630136de57cf46092118657004499020ca182d07ee5724c61a0c79533a00907dd125ab9b8629

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_MTOC_help.H1H.4d0ba2

      Filesize

      491KB

      MD5

      716ffcaf289acd52353c0457ff4525b6

      SHA1

      aac8e1fa80d9c3a0ec0e011a5f34f8f216bcffb1

      SHA256

      8082b549fc2e15d586ce6b24438375d279d3386691e93b8811aae6aa06ddf708

      SHA512

      a62394005fc9ddc3614fad0eb53453d0d8f2f5b66c9fc0d84e869ab8fdbc679da40425f35aeaf1b821975ac416b68a783e0d373ed2a640a82fbb8a2ae1b2f366

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_MValidator.H1D.4d0ba2

      Filesize

      14KB

      MD5

      e914853c3f20caa9557f0ecd83fe6255

      SHA1

      06a37cfb1eff07483de306343a23d212c6fc7b2b

      SHA256

      68c5e5da108488b2c6e999b086a7742226841a29cf0e955dfe7fb2dd49462a25

      SHA512

      6f44c4f5a27c10643ed70560f4803650a517a2a9d88022749a5e3000eb022f7b73fe037fbe0c6693469a3039bc87335dea38d3b956aef98b1351797235bad698

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_MValidator.Lck.4d0ba2

      Filesize

      284B

      MD5

      84db2340438afe220de0543564edb302

      SHA1

      51cd63de5c27b8bf7596d61f27af3c2f3bf3fb17

      SHA256

      23c28abf65811654dfe81da5e5b794443f345477eb09900685692998ad232bb2

      SHA512

      67ee7382167b2012da7a741129a57bc1ecbe1160b6ecc2e8604570813d905e3d790568101560a99944ec8d48a9f4b589f7cdf6278f9de382d4a252283cd39fce

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\es-ES\Help_MKWD_AssetId.H1W.4d0ba2

      Filesize

      229KB

      MD5

      8aa2d071a2cc01d3473a2433649300f1

      SHA1

      678714b2be5245bc2a134408da280eadc4bd9854

      SHA256

      d6025bd764ea7e775cf149567d48008da9839865435972d828ec787e415a0315

      SHA512

      c3a41372dc22bdd04fd3f6a4813e8ad7266dcf5e972082911ff65ec65576b36f5a22233a0307eed665dbf8f4f9a6e948bdc8aed5429c8f743457b74cd43041c3

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MKWD_BestBet.H1W.4d0ba2

      Filesize

      422KB

      MD5

      f6a974e6da5d4c71cb981221c77d1b1c

      SHA1

      b326770948ae7edaca22478f395bdb72386b68a7

      SHA256

      332b44a55161c6f96c3191481644dd7118a13c875f693360f0b43b9d3fb3d537

      SHA512

      3154fe3c69e4d686a1892e796ac2cea6c29a4f770a89230ea9dc0069a80eb9d1074a092218ce887858121a81b77b827859a4cab25b6271501d489c2f6f15cd4e

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MTOC_help.H1H.4d0ba2

      Filesize

      531KB

      MD5

      ac7cd0e319a71f8da47a4bc9b86360ae

      SHA1

      8ccf1acc124fcbb0d2500616f4cebba03a11ca13

      SHA256

      8d0b2225146cf03660a03376f1ebd63fb410c05c58157e41852c85fe0b4cf431

      SHA512

      29489866f60a472e4b3d9377e7f784b09b664b753498a0f1ebe0bbe187bdd39cb0c4452d00bc8a090fe40a1d99397e015e3e34f29615ca80f779381006dc7034

    • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MValidator.H1D.4d0ba2

      Filesize

      14KB

      MD5

      dd796e7979f51f9d0464142b9d802a13

      SHA1

      d5c2d31eb4ce4aab0737990edd59d345119ba380

      SHA256

      a733d04492d839951ae3154d0639d739578568faaa791ab18b3f82893cae6f75

      SHA512

      bde9a0ad31d0599962655fa9eefba87e5f1c9c5ad501ea62e7570b883a083cddf0ec5e3f90870ef27b9ae24c730e4b57ca0135dd3ce5c6ab85d7e0504f720439

    • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 05.wma.4d0ba2

      Filesize

      110KB

      MD5

      68a7d58e04e23d26f1073f5281b0a57a

      SHA1

      ce913fde5e4f26d42ff906ba223081fc2f4540b9

      SHA256

      8514f14af2ad64565df402d44feee5b0f62cc5d284d4962e8a246e67294b76be

      SHA512

      2231324cff2f70be7d54c599317890b4f899d8391e55f8ac4a134b183dcc2a1b13db79f7cc3d49b24c84d88396cb88e888b77658242e016922405f280eb793e0

    • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 06.wma.4d0ba2

      Filesize

      92KB

      MD5

      d08ece3a3013d32bb0944cde58fee6dd

      SHA1

      db3c865b6c74f420a4d5be48327a46310423a6fa

      SHA256

      bd6cace9e20955f71486dad22a884b917d5c75cb4e3fa19193d19b027c366a7f

      SHA512

      d2a6902b133dcc5715807fa3c3cebe519cfbe7715d85f6ee1b9d43b420e83c5a7aba80f6146b660066c3226e9f58be7db7f246ff21c8f81d6fdc66b5564faa09

    • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\state.rsm.4d0ba2

      Filesize

      910B

      MD5

      eff72c5a42f8f2474d7706f4b8fe0248

      SHA1

      e7af059c417d75bb72cd8a6fe3992da5c5d7704f

      SHA256

      f0cc038b723fcd9c066c73fe30a5143d278bdd0e97b6ced2275dcc8b3679ab08

      SHA512

      fe43ae1c27b85b14f77ab37443445075e297c4f042c0f70f08e0ed4fd1645d59fff2a2e72ff892a85da6ef3700ec25839df97cdd89a991ea2f4cb79bfe6f4104

    • C:\Users\Admin\AppData\Local\Temp\D430.tmp.bat

      Filesize

      83B

      MD5

      2c2fc328d02bc263433bed28e3b6cb77

      SHA1

      8d32abde61868eee0b4ce98b3b27d337ba61391b

      SHA256

      c21f17654334348c95430a87507bc27efbcf892a76a2578dfba68800828f6ffd

      SHA512

      57449e59563e1311c15476f2cd5c1936cda6a0bc3a6d453b398286b907a14b5d683201910de4e0f36e1463f11ffee267d2197eb8436cc5c29ea4eed125b5dff0