Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 15:45

General

  • Target

    b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe

  • Size

    282KB

  • MD5

    e553d54a06009595a4ae269e9c96cbe0

  • SHA1

    e762481794fa9096f4229f2eddfe0266bfc9f7ac

  • SHA256

    b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435

  • SHA512

    dba51a50f1b94ab8a7da9f0401993ba336b623afbbe9320a09f69fa89390889edca32bf237a9cc9f0b78e181790bbee005b43fc633feefc389bc4bc757f602b9

  • SSDEEP

    3072:uvgIGSgSWSQ2qobyyBPgKlBkqdX2z6oXo:SgIGSgpSQ2J7PLlBkYXxoY

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft\Edge\316108-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .316108 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_316108: eyPo33hq1FM9D+9KB3xpf78IV4zHlaBWJQMWm8bS8zETFrsQCM +5sQcaWUZSz+GsoPUI9lROd5Ly4AVXODAkwT3FzT3/EiVa41Zj AixraDWA0yF/AR89e/jdWoDCg8VkUxW8HEGm8iNghNhMNlBGst LinBCPhMWk7ohr1+VtYfsAcY1Ao5yDZ6fuabx+U1qiCY74j41l GYt7yTSCWnOTfWZB7wY4NE9PwiByvJjbsGNRe+e9yGDlfye6CV hEK3R3CoTvNKb/53ATipgyP7CgRo/2dfO4Btg6iQ==}
URLs

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Detected Netwalker Ransomware 6 IoCs

    Detected unpacked Netwalker executable.

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Netwalker family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (6808) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe
    "C:\Users\Admin\AppData\Local\Temp\b756980ef12f8abd3cc6c78f4b1574b58e46c83c3353de10750dcde161b35435N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Windows\system32\vssadmin.exe
      C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:4244
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\316108-Readme.txt"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:10316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\F107.tmp.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5856
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /F /PID 4080
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:6748
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\316108-Readme.txt

    Filesize

    1KB

    MD5

    2c20cafe74a59f347ab8d7578fe64ffb

    SHA1

    9901bf7fc470fa17faff0264de370ec6f72d871b

    SHA256

    f8632f14c8a8ba44a769f9e5f80fc47b8c4df1bd6318994daf82e75a1360df92

    SHA512

    00c526b2be43aca231d3eaa85bd4511e8a7466037f8c29b6dc6fe7f80bb590a3af4f064d07545e267941d9ac23ab80ad80f6f32c182d6f6f05aec0ed8accaccf

  • C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml

    Filesize

    3.3MB

    MD5

    f73df88605e1e3446cc2a759010b94a2

    SHA1

    9b21765994a831adf19626adf301a034d8db39b9

    SHA256

    50b837bad6bf1467b49123ffcc160371af3788ec667a109f49bf00ebd39cd39e

    SHA512

    8e3fb91e1e4174c221dda54e5a4c9d5935f5c17edbd4bdbc7c4e6fd9c4f92636359e6b48d1952d5c8e74c06379d06f5ce25ddba13a3dd2b0c6c59ed78d249f90

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\AirSpace.Etw.man.316108

    Filesize

    412KB

    MD5

    fe26cbe2d076bcfc1595f9ba3dd7eb09

    SHA1

    844ca6c02cc9cad655ae0484a709c0dac1f23a5e

    SHA256

    264528a52eeacc21f2c0797299f8b4522950750b40ca9e5a31f8b9990c1d8f78

    SHA512

    b928b8e6ff07d1e770c9a4ea5e689eab796c1ea5abbd0364e2028db325fb250af2ce5ad6952d1c9a6851a510e16614551db15afe6ce6599e5f0190eab09e900c

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.DCF.DCF.x-none.msi.16.x-none.xml.316108

    Filesize

    16KB

    MD5

    5ed69e67c094549226d76e00f420bad6

    SHA1

    ec79e2b4f966466b977c32a106df6c9d438defba

    SHA256

    0ac8c23452990420e5bca406070144cc52e33439976559886ff7a7837b9dff64

    SHA512

    19b6607ff278246a86d8da4454e6f07d86fd20b170b5a88db9ee1d8d64558aeecaccc510ab4ee1e02a203e8b67e888da8afb6f83700ca5e5751ab8f70c693fcf

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.000.316108

    Filesize

    506B

    MD5

    52d3337844ba438252cf072a0bd37033

    SHA1

    7efe1e00323ccf9685a4aac68d521097d3299d92

    SHA256

    c42055255b0b513d74c995ed453b84804fe5a97d4e62e72fcb32c3cc6ca4888a

    SHA512

    ab52ace4423c86ba00367b3fb8fa3fa96e944483017150865f3c8e9b45e80ddb80cacca1586038fb70596f7dbac88c793ee609a91d11a4a3d09a7ed6ab126ec5

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.001.316108

    Filesize

    64KB

    MD5

    ae1b896e9bedd6182e4f6a5a85f96624

    SHA1

    c9338afed596bd61a460603a1020d6943bc25495

    SHA256

    f939f5cc724e1b374d41030376eb450958c3648e49db439d7594a33b8cb5a2b3

    SHA512

    7a5b15c1b36aeef0c4ff1dc897812c3b65ea8f71a9ae8876c7fc025c3dda0d106cd5a02f7133fbb64b180879e2e74917fb81615bdfe173932a009d2af52ac675

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.002.316108

    Filesize

    64KB

    MD5

    2c3b1a1000afb9a364713555324472b6

    SHA1

    30a0b995a7da812a7932b3a594b45f80e7c33521

    SHA256

    b410973822685debebc86fb00980838d80f034d0f3b44c7e0412d5e87ac1f153

    SHA512

    bed91dc95f3f3838c107a80946761c29224f3f87bda07f325f9d9bbea15be34d8a88e52eed62cf6265face611811a5391d0eba525a292f37bc3d881afb26e757

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.url.316108

    Filesize

    489B

    MD5

    5d4c90736e5a35b4e4c98fe6921efd7c

    SHA1

    921bdc0d4ca07bd7928dd317e11567fb6467603e

    SHA256

    2757e4efe82dab76549c538c750823d9436b06fe18045362c58b48743945ea21

    SHA512

    1ecc8251c56884ed399fcbe6dedf630f0f77709b8873dc06d7ba0b0977615602c001eed5f497c929a3cbd652aae3e5b3944f9083e6bba4bfb7fd9447d7e2753b

  • C:\ProgramData\Package Cache\{d87ae0f4-64a6-4b94-859a-530b9c313c27}\state.rsm.316108

    Filesize

    1KB

    MD5

    02bd49c68e39a04ac5b76558a6d05840

    SHA1

    d19d3a46a8c5c4d2b12300db24f08da750472925

    SHA256

    7f201cc649dd1fdd7d4824705f6f9ab2694297495b06a9a11cf90c7f7dbad4f2

    SHA512

    e6f9d14a8beec534d059d2742af96af2978d2cc6d636b286e7e394ac25c93aa69b81e2bba3bed90024051c806f68558143ebcf4741a10c61a7972c215b2c0678

  • C:\Users\Admin\AppData\Local\Temp\F107.tmp.bat

    Filesize

    142B

    MD5

    d8cfe105121a5b7914204d6eb15a7129

    SHA1

    ad6f285ebd3f6c27d53c7525cc72801e3f4e3464

    SHA256

    003c1062c3e3ddb0aab528c99a7c54c067a49d77dbf1419b42a841c76dec9495

    SHA512

    063f1786a2d493a55c0bdc25391212b4f2beca9111c57b62f71a7e5b052f71144b0f356f17429606f562a995f37b19e33d126decdc877da7858f638e43ed908c

  • memory/4080-4662-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4080-4661-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4080-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4080-0-0x00000000005F0000-0x0000000000616000-memory.dmp

    Filesize

    152KB

  • memory/4080-9128-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4080-9139-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4080-9138-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB