Analysis

  • max time kernel
    94s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 13:44

General

  • Target

    (2020) Netwalker.exe

  • Size

    69KB

  • MD5

    80372de850597bd9e7e021a94f13f0a1

  • SHA1

    037db820c8dee94ae25a439b758a2b89f527cbb4

  • SHA256

    2520b15068fa108c947db179377c6b462f2c4f47037168bf8c69fcb668cb11a8

  • SHA512

    f43db3569ac60d6ed55b9a3a24dcb459e14b0bd944e9405a8cb2bfb686eaeff31c82ffcd6c477d6a6affe9014ae8ed7d8af174e8ceebbcf00b64ad293901a77a

  • SSDEEP

    1536:juCWRxL7hbUiQfovecnXUU+hhOZuIWiFp+ZfaBZebC33O+Pd71vb:KCWf7VJQfmeMXvkhOZu1iFBBZebC3F7t

Malware Config

Extracted

Path

C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\2FD520-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .2fd520 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_2fd520: 4KyOsro65d8fSqpCLRv5yqB1AmVW+UcbIzWmN4yILtbKBeaDsK mU8h+sc0f58Q2kD59nOJe3+JJ2BDAlLQ3TFtL1q5Vft3hTAg4e DcBB0TrafQKYth4x/Rj7nja9OOO6qXUYsLqPTSQ51YnVPjzq4l 4ZkUnUBC/4p/I0GeTbqYQB9HKyBmK1JzY03Qa+RlFcyiy2VbXz n3nKvb2G5IOWJ3VdFoQFP3xaHhADVOHAJa07aHUhhcd7U2+k6V XnDMxZ8LWeW9jpLcXfbwdlAFFhKQIby/gb9ojM4w==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Netwalker family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (6807) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\(2020) Netwalker.exe
    "C:\Users\Admin\AppData\Local\Temp\(2020) Netwalker.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:4048
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\2FD520-Readme.txt"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4628
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\56A.tmp.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5328
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /PID 5108
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:9824
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\DeploymentConfiguration.xml.2fd520

    Filesize

    910B

    MD5

    9933b71209c74a9611ad1b07475c5104

    SHA1

    67a8774dfb94fe9ce36d4e99218ef30cd32846c9

    SHA256

    ab7fbdcde0c7c9cfc7fe1e78379f9edb7bc1978de19da6010e877b09deeeb3fa

    SHA512

    b7877a86aeeba72fbc7ef5f290df7b70bd500ec60aba4ca1aa934272306bc91a6d5786d6db6a592f7b48528c173caadc07b94039431d45c3ac7f7a4add93e2fa

  • C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml

    Filesize

    3.3MB

    MD5

    b9dd02b913c5213c4abc90dfd072a2c8

    SHA1

    8972c5850b97549ac488c707637cd1d288d943c5

    SHA256

    918654bf2a7a712197462d803f8c803e26c29d616d68692d5fa64e22f6b8f4c8

    SHA512

    332b4443eaa827c5eb767dac80a7f1b1fa177f4b27394fd0a33a9d0c393a4e940f1fcbbd89564b62cf125bbfd10023eabc3cb8249f7d3c20ae608612f04ef0b2

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.powerpointmui.msi.16.en-us.xml.2fd520

    Filesize

    27KB

    MD5

    cf1c64e3d358bfbddb7726eb9489dca2

    SHA1

    e438c6487aecde93c0615a393f1af3cf4ec6ece4

    SHA256

    b1b5402204274df0007907f0dfc4e5d281e793ff28070ffdee44af88d561b613

    SHA512

    da29bbbf5f6be376d4a69551435d55603a4be74bb85a3874278fbe7cfb72d3c8ab185e23ab8a131d17ac87eafedf1f259f16b269daef0499f79cb72616cdc60c

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\Microsoft_Office_Office Feature Updates Logon.xml.2fd520

    Filesize

    4KB

    MD5

    814132aa71a17b0c6f3e1ebdfac0b017

    SHA1

    0303d1de33cc04f8fecde527b8cb83cbc394339a

    SHA256

    940fe14bb8c8739f40e3cd9c7b3e3361a3ab974e43da4ff68aee1d1374fbd0e7

    SHA512

    0be2cf197ce2968ebdf8391b3ec5fa72b4b964b1d3d9623e595a8959423a60c4b10c11a93fdd9113f37179bfe78c098a1f581de97ab99cec58717daf22c450e0

  • C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\2FD520-Readme.txt

    Filesize

    1KB

    MD5

    9c47d6224a370614ba402213938ebeff

    SHA1

    0a157ffe45c92778f9206164a237b764bdfd7986

    SHA256

    c402072a15fe89441a65b9704269b192ab04428ee979c990a752af55696c4aaa

    SHA512

    6136a3fba15fa2b9d9a57d0c9382f45521948c2de28ecfaaeb11cd77e2227442e8eff4211880b03d2cca3aad5e7662bcbf73572c4d08e11cbd1ac34ec073be12

  • C:\Users\Admin\AppData\Local\Temp\56A.tmp.bat

    Filesize

    93B

    MD5

    7ffbca03512dfbb46e8dadd72787ca5b

    SHA1

    c5e41dc231762b6e8a13f66afb1a0ce8b9eab946

    SHA256

    1742a5a5bff09b9e63872b92f5f425553a6854cee71e40e40ac4e3f8239d12ae

    SHA512

    54066f5363a0fcc4b59f1fd855331ee67e35388c2690512bc2900fac1aacb2ecf1c878339c083132e33d2096e497f6a705cdc5e58c9248514df4465bb0450f24