Analysis

  • max time kernel
    33s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 15:45

General

  • Target

    b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe

  • Size

    282KB

  • MD5

    e553d54a06009595a4ae269e9c96cbe0

  • SHA1

    e762481794fa9096f4229f2eddfe0266bfc9f7ac

  • SHA256

    b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435

  • SHA512

    dba51a50f1b94ab8a7da9f0401993ba336b623afbbe9320a09f69fa89390889edca32bf237a9cc9f0b78e181790bbee005b43fc633feefc389bc4bc757f602b9

  • SSDEEP

    3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY

Malware Config

Extracted

Path

C:\Users\Public\Libraries\A58086-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .a58086 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_a58086: I7IoeZEwWgVvJatHTyf665lcPBornBuFVODepI/H7wCfxStWz7 hQytm8QfdFqIi76BSFNKxz5q97ijuHf3VqM95IrZbsseYH41Zj AhYvfgl5wwq5mqIAajDxfc0EzkWK4LtbMI9UaCYDF+h3hBr9M9 r62cXviql8QVn7T5tiFr35kxnhHvjfzuQXuxHnOZ1v8jSPfsaY krTT2AUbxszzwdFVPKnUk48FsAxJHuErcr9x4ZgysEWhxBxenw uisEGvcuHbL9DkWNb1Z5IBcS3gazyfy0Jy4E99xw==}
URLs

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Detected Netwalker Ransomware 7 IoCs

    Detected unpacked Netwalker executable.

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Netwalker family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (7446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
    "C:\Users\Admin\AppData\Local\Temp\b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:1416
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\A58086-Readme.txt"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:6408
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\39F4.tmp.bat"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:6832
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /PID 1980
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5240
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_CValidator.H1D.a58086

    Filesize

    12KB

    MD5

    82d76a8e13826fb1f0eba8c91cb75cd5

    SHA1

    ce7623c56c32eb7a43d63b058a0b0f7ddf410b15

    SHA256

    05cc537cf621588383267d207574f0d4929fb329de1bf04b4cb9e228b5a0bba0

    SHA512

    4439cb56baedb760bc1462b8d5e91976e9355285f473edbee3b04a0b838b20aa23b9b7f24b11128f4bc7121de6b54ba205f85f89bc5ece5bdc946604eaad1d7c

  • C:\ProgramData\Microsoft\Assistance\Client\1.0\fr-FR\Help_CValidator.H1D.a58086

    Filesize

    12KB

    MD5

    61e6ebf23272e879a391ec05b1d6504f

    SHA1

    3a2d5bcae612317aad0479146f9b0b5a1cfe1b31

    SHA256

    fc485ed85b3bca20d1e81d49c9779ddc47783b8f30ae6bf15d78e159de758a8e

    SHA512

    739a28982e80b18a15f3216c49967c9c8781a8c4000a6cb7356acc985fe0db0686db06b4c148f44e2f4f4cef0265214320dad413abd5978ef05ac7fb2334f273

  • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_CValidator.H1D.a58086

    Filesize

    12KB

    MD5

    74b41582b3a8ac69e72d9c0d360e28f0

    SHA1

    471445a440c743aef80f2d7c611b8ff4621e87f6

    SHA256

    64899aec6562216893f4da66268aee4fafdf6f223a775569015485c0a8a18852

    SHA512

    39dc3426466b7f7ca348984359465517155487ff8749b6e28f5e0ad698700e95efc8a452b93a5635677935a1cb861f40c6b8b231cb54387f8627973ca7c2d298

  • C:\Users\Admin\AppData\Local\Temp\39F4.tmp.bat

    Filesize

    142B

    MD5

    4286ef35c233b78458d304786feafb04

    SHA1

    f324828720b930941e044a6c7057dce9df620b54

    SHA256

    c0c32d4f96fc99c61b2530974e076750c126e50c6a3429ca668454a0b9e3259d

    SHA512

    95023413c77f56ecad8d197058a7380c530a6589cf98ce5056d1d564e98151bdfccf674d8e5d0463e85042b595eb9979f4f6fffafac94d05e639895008304572

  • C:\Users\Public\Libraries\A58086-Readme.txt

    Filesize

    1KB

    MD5

    05d8347a9a5d53a487a7e9537c13f414

    SHA1

    e5f307c13b0486119fd58008dd56bd5da0097507

    SHA256

    0b46eaa7abb5b1a6d51c3568a863eb86aacb3fe59fa917515b25a6d37f8537dd

    SHA512

    c1a474bac3bd3d2dd470ce0f4f5746edd851e1c2385f3a056fb4efe78c4347ee86871ea6bf668a93f455b817561715f52c3f137565acfdb0388a3989b499d455

  • memory/1980-1653-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1980-4971-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1980-1812-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1980-0-0x0000000000220000-0x0000000000246000-memory.dmp

    Filesize

    152KB

  • memory/1980-8272-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1980-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1980-8295-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1980-8294-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB