Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 10:53

General

  • Target

    8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc.exe

  • Size

    69KB

  • MD5

    2edbacd070d1949bb5d97d3a6e4e23f6

  • SHA1

    761168968a1d951848a36ad428ee4d05153f1e01

  • SHA256

    8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc

  • SHA512

    a4b282b8c91124a6dc465573842a03b5fcf346af6e561eef66ea405fcb784251044e2f8a2c0a61cbb0e29f7efc02a71d131930b70e2c021978d00c0b3c38f344

  • SSDEEP

    1536:juCWRxL7hbUiQfovecnXUU+hhOZuIWiFp+ZfaBZebC33O+MEYTb:KCWf7VJQfmeMXvkhOZu1iFBBZebC3+

Malware Config

Extracted

Path

C:\ProgramData\Microsoft OneDrive\setup\623CF3-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .623cf3 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_623cf3: s4i/nQ/M8jYZnOvbGDwf4NTVQJea+PF/roDc6H8pwbYk1SGXx8 RpvEEUG/++ljv/b0gfRbUVCh88RiXZGjM5go9lO2yqTYQuq/a6 0sTPJp4v/I6boINIpkMCUYspgGpthudejtka6HMmyYeiZ6zVBd kpnKUq9WKFTE2L7uHvK8/Xlm9cZlQXhwV8GrWBIgfiFtmeOUK0 Sk0AobO8AACxnoIejzAEFDa7opWlizxorrhjUPwCBR7Z8tMbmd /QOQIQOgsuWSW+ukL2nLzait0WKweixZP6Q3eOfA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (6738) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc.exe
    "C:\Users\Admin\AppData\Local\Temp\8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:4840
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\623CF3-Readme.txt"
      2⤵
        PID:5680
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2B9F.tmp.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:7528
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /PID 4352
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:8576
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Indicator Removal

    2
    T1070

    File Deletion

    2
    T1070.004

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft OneDrive\setup\623CF3-Readme.txt
      Filesize

      1KB

      MD5

      0549f028bb1f52f423eea0fb66025269

      SHA1

      9dc852aea4e49bb05440dfc0bc38b00e58798a7d

      SHA256

      1bc5d3c537962f02b62ac3633c2e827e6b4f175a0bfa3021fb6d6f2936958681

      SHA512

      a2b509c8616402b3ffcf00d5d486c93c651f15eca4342f48ec6406e593cfe4fafe7d8b2ce6494e7c718449a00a387c016f442a35ac7f50f64ed0e6817fa81963

    • C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml
      Filesize

      1.4MB

      MD5

      8ad2a72854daca4f6b282598fe41d405

      SHA1

      f3c8108e414a14f359f29f853b7b276be85b62e4

      SHA256

      880e4867c0454a6a87ddf3c2f52ed0effadc0eb0b411dd841a037bb805baab0e

      SHA512

      44ea2978bc1ac08554ce59c5424139fd7b19be464fc7178f282b2939dec9c2f285d1b1ab28d0d3c47bb5dd36ddcf1889ebffcf582443efda05ec195bb78fc4ea

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.Proof.Culture.msi.16.fr-fr.xml.623cf3
      Filesize

      24KB

      MD5

      24d5c72755a23020fc3551674ac89cba

      SHA1

      35c4092478c039e9cb1a85c785fbfbb7be44939c

      SHA256

      23e418f0ab3911bd5a0d643b1836677139597637d28ee72f385feb2d43dda35e

      SHA512

      7ef6a8a1939e054cf5411c89dd4e2cf92c254701010d72f8f66fb7a7890633e7d8c6b87b3a10f91e5a6d05578f82565160cdd1ed0feeaf32c805b1f02347f4a8

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.Word.Word.x-none.msi.16.x-none.xml.623cf3
      Filesize

      93KB

      MD5

      42b25e2780d0b6ae84815a8ea0c7478f

      SHA1

      aa3af9006cb38991e51af8e47a944dc263b21511

      SHA256

      e6e6c772086d993645955022f2f11f30d0ddf7d6b9ed13c0ad3220294a39c911

      SHA512

      c16266d5bac3f883f36f9eb5ea1ed9b0c04424596485d912676702c5e682384350813048f03ccb7af2a36246ae3b47a39152aa3c956446fbbc857e359d745bae

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.proofing.msi.16.en-us.xml.623cf3
      Filesize

      2KB

      MD5

      0a99f22c4e769d5229d8e211c7fc1d40

      SHA1

      ec76e273af4588eeb425d514b24d4c2b80229639

      SHA256

      3023156694c16f6b1e959e2356365b3dea910815cdaf5652367fc7a06ee9b369

      SHA512

      3a3f15a06647282c3ba9b58e02be658eca85a4f28c9834b37bd5c748e56821990f6800dd624d8a784c9e2fdb28c29c6e3bcb4d98f84123d55f0edd6bbb5f2f83

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.shared.Office.x-none.msi.16.x-none.xml.623cf3
      Filesize

      719KB

      MD5

      5d776336865724d36d160333d78f49f9

      SHA1

      de607dc20516bb1a501823e307bb4a0b305f524a

      SHA256

      1e095eb7419101e642681a27cd9ac34021713df570e27840dfdba17542296f70

      SHA512

      74d93837984c3e9586c1bee90f747ae085486ff10d26ab17a81ee20a6d18968b64f13f25d52eb056b29798035f233789a9a8bec5ab36b090a2f89941d679aba8

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\Microsoft_Office_Office Feature Updates Logon.xml.623cf3
      Filesize

      4KB

      MD5

      39205b98ce512e4b460ac00dd08f7aa4

      SHA1

      ef325f94236fac65ba1891434d2fe65278cd5333

      SHA256

      1f2c546036963b61ecc48abc06e530d3541f14f4b508e6bd2e4045642229366f

      SHA512

      7c40fc97b6cd964c9708289c8323e6a4a73000c2364ce96269a9234dc2966046cca9aa89956b077cb1476f914ca3e84c213e16464f696be4fb4355ae27ccafe0

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\Microsoft_Office_Office Feature Updates.xml.623cf3
      Filesize

      6KB

      MD5

      45c3fb7a635c924a9f8b43b9b48be36e

      SHA1

      b254febbd5310c4ed270a0cff3931bb83b2c10b2

      SHA256

      f2a5f49ca3454979d466a7391cdb6636d5d1e7c80d5b944a824a3c703a73cdca

      SHA512

      8b8c676e515fa69ceb915c8d54dc0880535e0d7a971cb867a18242c8e36a347f0993268766fa2f557a16c6ddeaadbcbf6fc81715222942d3f61924869728772e

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\Microsoft_Office_OfficeTelemetryAgentFallBack2016.xml.623cf3
      Filesize

      3KB

      MD5

      3c970f95910c94b4d4b06db1f383ed10

      SHA1

      ed24c5307246f26a8694501bbaffe897ff151f3a

      SHA256

      0c015f1dc06a7d9e278817cf2dce0d2c9b6ed099fd014e4f00c11d13f0feb3f4

      SHA512

      1f7555c08c74d02e148402730059fc3a10854ce5e442831dab1adb4662d5f20c63f53ae990dda9697d3678ef0481ce9455005988f61938b031ec3e21d4313ff6

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\Microsoft_Office_OfficeTelemetryAgentLogOn2016.xml.623cf3
      Filesize

      3KB

      MD5

      9f64dd0c3997565d90ca10d60004a3f0

      SHA1

      5adba7f3ab2f9a602c894f0e8b7a1b43445937f3

      SHA256

      09029348614cfb70879e11cc40708533e751abb42ad095e1c1da99d0a12aaf97

      SHA512

      2d4927272b5c93c0495db16d40eb3363edc709e583576032602c6e24c11d644445b0a2bcba5c30b2f51039679c9735b9199d901af7a24be6c4e34f19bbf69d6b

    • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\wordEtw.man.623cf3
      Filesize

      1.1MB

      MD5

      db95332d6e2cecc486cd367c889208d1

      SHA1

      1d932e62cf2aec8bdff65cade49bc674f57f7d33

      SHA256

      fcbdd56d3a1253b0fadff84caadc3d37d782c60657821e9ce466c8fb0b9ae0f7

      SHA512

      5a07d27ed2a150cfc891dcba7a727b6a7fee0e6d69daedd66ec4aaa235ced43139d368b2470bab1a11deff9ceed90e5ef70b84f90e615b33edb929d755ce9e5d

    • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.000.623cf3
      Filesize

      506B

      MD5

      228b67e8172e4cee53fd567b21297ddc

      SHA1

      bd9c4739d64a39b05ccbf57203ca2c90dfc1efc5

      SHA256

      598fada85123cc130611587751f7b1a0d0aff6b576f4b319c13730a43b495358

      SHA512

      a598c7868ee6d959aa277f2cf341eadbd0a63369791276b12fc6347c11e57499246f18d4317340fc576e319c0acbafaae2e18671878d9e0a0387a7729d8838f9

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\4c4ecbc0-0ec0-3929-aebb-a931a339fb23.xml.623cf3
      Filesize

      3KB

      MD5

      1c5f1b0c038b5241fbfba96016b5fd92

      SHA1

      b79d59dea5a866b134a4dde9285ebb0dbfc18ca2

      SHA256

      e8789e59600f69dd2eda15e421edb6afa740c3243d78cdee3f661e810f7b1d88

      SHA512

      cbefe2d9c305670194346203b00c9d314f4d42008a1e4dbf25d062f02c531fb6d956f6ea3ae5da8f36eabcf246edd5169788b17b942b65af550bbef57b6c53f1

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\52a7e8cc-4b89-0eb8-5b4c-0f924bfc3949.xml.623cf3
      Filesize

      3KB

      MD5

      fd2cb451d24f5c7fb96cd9972dd0d077

      SHA1

      d8c8059c2827e9017d1307878e407e34f4bcfbb3

      SHA256

      a342d568b559a6174a73e5b9a81475a4f39d6aeae961d2ac63c8c1bda4ea5be3

      SHA512

      b36a34b5939db015ade51ad2e855312bfa9b5a28cb16bdd3735634927b4831b4db367de888dfd9564e8b4b8b262d0af263b2fe70c71a2154fddc5d8ecca8c3fa

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\630a70e7-1832-4f42-e2a2-5d35fdddc45f.xml.623cf3
      Filesize

      3KB

      MD5

      4b31c89183efd31e02c1fa7484689555

      SHA1

      53e0b2066c8311372d13c2fa8170dab0b791ca3d

      SHA256

      b862f50ebae4596646b1a0bd877a1a7f8f4276cdc8c622074c63841eb19e002c

      SHA512

      c3fb3576bb913a829fb68c9353a87fcf55d769fa55c71d39f24f964c9dd5205c48a48274b45d1cf496b3b83f6c476c98f8108996694120f3a9c1b65f1e985521

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\8b9da20b-5eae-490d-bfa0-c77e2e127883.xml.623cf3
      Filesize

      3KB

      MD5

      326de527e2e66a637c2a4916904cf081

      SHA1

      c598ca2741cd0ce7f6f488f4591dc3784494de77

      SHA256

      c2603bbcd92a473688a6748b97435f7e5727e350a817a0c1b6bf523ef9525447

      SHA512

      94468d7bc649a8e73219307dabe399b3da2f9a11f332e8641161be5b89bcf8ef9b3b5d9b0c900626f2b33e9220453d14c5005863fcb4bb31b18f61872ad07f37

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\8cfc804a-d777-2361-1670-4569e516397e.xml.623cf3
      Filesize

      2KB

      MD5

      e5d9a20bb715153acc8173e5dc8cab52

      SHA1

      cffd25804be01818a7055f0dce40602d031a2a3e

      SHA256

      88afba9f25a8a4eefd92fd75d6e90a7b77ef258951d66c832c8687341815f19a

      SHA512

      6bd6aa2f454bf16531384d8f3101f4cbb3fc69712d5d63dcaf016eced6bc3ccbcdd2120bbfc29b3ab8d73333c90abcabb19cebe73f394555bfefe29a2b8ce755

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\b59f5123-f94a-28bc-cf2d-1f77c3cd60ad.xml.623cf3
      Filesize

      3KB

      MD5

      ad60a127a9fa23748cf0cda9ae36a62d

      SHA1

      f05f85a02770b5885a4975e48261534b9ee98976

      SHA256

      008ffc8b5ae70b1f4540763a755a4be40a267c9142a86b4b789745b49687e7a6

      SHA512

      a6d7a15d78945d94beb2659e6879bd2156120038ec01637c89d3b5788462c534553d4eea57a93c78af247a84c722f9955f8373379c4526f9d88bc8c10e92afc3

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\e335baf1-18ab-73fe-e089-3fa0a6e71a35.xml.623cf3
      Filesize

      3KB

      MD5

      48884eafdb459b71531cce3cc1b6e8ef

      SHA1

      ae8a6859fe20fd3cf10dfabeb7c49d65c27efe6c

      SHA256

      34e45e7d55aeeb4cc22b5e500820e3e9bdd395785a22d210a7e3af1646955f66

      SHA512

      b4c70691e29c6d706d00889670c1d12eb25730e52990402df1f64c4c463d65f6f189d8e8f5633701b3db010866068405dc210abc26fc55cc5b55e97e74de7a09

    • C:\ProgramData\Microsoft\Windows\ClipSVC\Archive\Apps\e8fff2df-6041-8f21-3df7-db31661aa09b.xml.623cf3
      Filesize

      2KB

      MD5

      31862a92db875cc81c59eabf4d72329a

      SHA1

      2a657c42e2a62d90fd2960e65c432059d7206e4c

      SHA256

      19cb6d54d050aa27047932ba2a9ea2d881e80312e6223ed8e49a23d6d678f60e

      SHA512

      ec5afc6d799d8c642cf08cad1e76730582a908b3994d5b491494e79c50dab3dab44d8aa94dec7d999a1a94cb92d34a0f63a8e9661d61919655fbaa3ca3184cac

    • C:\Users\Admin\AppData\Local\Temp\2B9F.tmp.bat
      Filesize

      141B

      MD5

      051ce6568b971a7d728960e44dc0d260

      SHA1

      795438150dbbc7952e343511afb295f4220846b7

      SHA256

      f2eadce2d262965608d1e346f31af61140ac43743818f042e4e0513b8a8f98e5

      SHA512

      1653b1bf8353c8afa6159048b6722fe0d0c6f80c2c7bac6948c2a9637cc2676d0f6a98468a54a4f5b13939409576a2b49994bb762ad401bf10e2b18ff4414564