Resubmissions

22-01-2025 17:57

250122-wj2xjsxrcy 10

22-01-2025 17:23

250122-vyhxjswrcz 10

22-01-2025 11:23

250122-nhgk8avlal 10

Analysis

  • max time kernel
    92s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 11:23

General

  • Target

    2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto.exe

  • Size

    57KB

  • MD5

    005d09ed67681b222e581e8741fc1d64

  • SHA1

    22f1ae3021a7b64c66a06f857ca6980440904672

  • SHA256

    17317e47af9ecac9efa465dfe13e130fc1285160974041a75e0a90e21908d1af

  • SHA512

    01b32a89435269ee3090595a02aee190715bf68315705b1e665d6d7507a6d84c271169e7e267faaa97e519713c3c563b9fc81bef208e2bd13334a7bd9f33b0ec

  • SSDEEP

    1536:Pokamp8C3eGQYVynB7pc21bV5Mbem9zM0gh2ZHHTsrt:PoxmyeDQYQB+21bVabemtM0Y0zc

Malware Config

Extracted

Path

C:\Program Files (x86)\Common Files\Oracle\Java\B86211-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .b86211 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_b86211: ZymyYn5enRPRMMGQNLFaXCgxSubuBgte0JHOLghdqdSY5Fp3oy 6Nh/+nCoGCXbA1XK7BaE7cdO6nhWC3A4JTIgLVVgzLaQIzNPbn hxKcLfd6VzwY9o0tIk6KVUEEYgivDZMxitj1QJ+y4qnYAA+/we pka5doqTn0jdOHlF/KECZfonsX0p8c0+CIlV5oA6gxsNZ5RAPy s2BjSMwOK6pBLW61nxRf1O7+424baCiDSnOvDvjcu58NFJa27X UPoDzMC3yRDNy+CSaXTOgccsJALpxSkzKY8RpuAA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Netwalker family
  • Renames multiple (6775) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-22_005d09ed67681b222e581e8741fc1d64_mailto.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\B86211-Readme.txt"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:9960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Oracle\Java\B86211-Readme.txt

    Filesize

    1KB

    MD5

    2d6343f500e2d7e5cd98218a5e9b6388

    SHA1

    6360201147a916d31523d728c8e6f51cda9f7b9e

    SHA256

    f139a0f686e2eace12696fb7bedfde6a7e42db89f3529b89d3ab4e41ff2472eb

    SHA512

    7279020ef54e41f22b3847216ca048b15a6b66d49111c29fc3dd8717be2b8614ecca16644802d4d1b370e75d0999f1e4632b51bd90c0d821c5caa1ec4716136c

  • C:\Program Files\Microsoft Office\AppXManifest.xml.b86211

    Filesize

    3.3MB

    MD5

    a58d35b8a630efb887d8fbe1a2f81926

    SHA1

    70d94f9614fd14d632fe1594b0041554c07247cd

    SHA256

    c2caba47a901949f14ec93a7b38b271c134c116faed4358093e5b935014aa0dd

    SHA512

    5b2361a9a18ef69f9f16e2ba92dac3b1d622993d0510cbc4d30f656213f737f0de63e404c21e39772419d19832c711e8dcdb78c4caef3cb3541a2dca7565c1ea

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.OneNote.OneNote.x-none.msi.16.x-none.xml.b86211

    Filesize

    98KB

    MD5

    11de41356fb0063f4e9c2a7c6fcca7d0

    SHA1

    3663e8b26df5ce51ca2c62d3e6abff640e5cd06f

    SHA256

    d4c69c8a19a4b38284e87e9a211fc3e7a173c022fcfd26a0ebcf018fd49ae2fd

    SHA512

    455dd081ee9b378a7bdf2a76a23e600b12e764f32ecad2a1368884061891a5e3f22051e75ff110c1a2a855298c44b1e0e866e0748cbb4edeaa6c8d4cb73c833f

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml.b86211

    Filesize

    31KB

    MD5

    67d6d0b5f45dd0d5bc6e07091b4f1cd1

    SHA1

    5ea4f9cff063304cf357e543e8505b6f1fb3cf95

    SHA256

    6ffac1b789010962b28ae9530fe6e11b12a6369118dbe727cdbced64d58b37b9

    SHA512

    438a9ffcb7d40c3e30f3b93791f9f4973642cbc8ae74962f85e25003be0fc9075e61fd185ce658d05cb8a4c86e419c1da7c10296d751d011a6574aa5249c0b0c

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml.b86211

    Filesize

    109KB

    MD5

    3e02a5da21e7fa226d810d5aacabc1f0

    SHA1

    d801efffb6ad973508dd454a8697613bcc100762

    SHA256

    db8d395ca7b753f6a936204ab9fd946e92a922a430857f116979dd681b549576

    SHA512

    6b75ccec73ef379ff193cba808b44ae4a3191b042ebb98a59d41c46b1a762d69e590a31d811686eb1416666d978ac34f8c3d0ccf0fb2ec1331f41e6740df366b

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.PowerView.PowerView.x-none.msi.16.x-none.xml.b86211

    Filesize

    14KB

    MD5

    20fa1dedb69d9fe858df9cb0890de815

    SHA1

    5845be1387bd5252b7cc18dd08b591dc69a7be9b

    SHA256

    a69a06fd1263581dc7fee17d499c41ee59b64eb6bed4ccaf946d978b93c1fd80

    SHA512

    0ac53d38a1a01d1db0ecaecccc28928fa9ec2458f91b90c9cd4ed76756b421cb7591077fe5117248435d457b735b449398c86537251025f2d307ed3b2f3126e2

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\C2RManifest.office32mui.msi.16.en-us.xml.b86211

    Filesize

    16KB

    MD5

    fe31099b1c1ebaece639dd985baf7e89

    SHA1

    440c8ab264f3f7eaf2493e0aebbf576a117d1196

    SHA256

    7963760985e13aa9372f39cff732d853bacbd423551c2aaff5f654b7ecbff446

    SHA512

    09b520559db01b97d30a500a96f6128a933731aea2b2c6f94df09f80a6198ecbb88858ec6e5ebaac5c1557b607ee4438808a967dfce6a4a662a6376a89ecdaa5

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.000.b86211

    Filesize

    506B

    MD5

    fd64f9f119398d7f8485c501896b6f03

    SHA1

    5017babaa7d2e47d916dfdd6faf1e773c38a3ab1

    SHA256

    305a5adc4e7bb628d5e03c937ba99b8d00a7f3e1a68a42b34cd658630e9fb51e

    SHA512

    768f7ac82cdaf4751616494df31912bbd94498a7be456df068d2873337196ecd50a44cd1029e0319ef3862a3052ae9a5b54db8fd9068f23894bb7c51162a848c

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.001.b86211

    Filesize

    64KB

    MD5

    63cafd218fbec23323b9d98a87c8fbfc

    SHA1

    c4b2481f3d35bd3ae325a49ed18301e958ebc688

    SHA256

    e6d2cade105d3909427f127426f6dbb54133aa4b9a162b75d0051e5d4c95c297

    SHA512

    72b08c29dc5383b5f9a6b0f89e933e06b62039d0ecd8a799760388f33d1be847d23081280821abbd678a25294c285f75a9f3e689f8f56d4fed5658d96a9ed7ae

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\CiST0000.002.b86211

    Filesize

    64KB

    MD5

    f0d38f3c213e29a4838db96610fb610f

    SHA1

    e2aa8cd043f02d8636d3e83ab8b89aa0998a1265

    SHA256

    2fc2b87f60c8cd53562363d05f609e4ab4cdff4dba6cef301016f1c4a6e99524

    SHA512

    71812a6fbdb4325a1c92f952a6feddbe1419b3c233253873fbc42cb948f9932c377d4ffcdd4ac165cad347028e733d91417bec182b66fe69367cb6c5debd7431

  • C:\ProgramData\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\2F1A6504-0641-44CF-8BB5-3612D865F2E5.vsch.b86211

    Filesize

    434B

    MD5

    115217cd0e1235b4387775bf0238554b

    SHA1

    5b1e2e27ad8d7e89e0d6624d01ef99cf79522777

    SHA256

    489a4678f1d03353411c57ea6e5ab56c5b24588bcba70195cf5989c647cf3088

    SHA512

    0274bbb46ab659b1f3dfd1c0b2b95a57aad5639e5057d558e7f998ea72bf2af8ed5981db4352edaa36d87f28bee614b83f8fee2f6d00b31120f026b9243e4923

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.url.b86211

    Filesize

    489B

    MD5

    c76bafcc81dc3da68b325c93a5ca6c4b

    SHA1

    c4fd906b86c58febdba3ba9f467779f9fe4667d5

    SHA256

    5ad9ec125cd8e2d2f8c410eec6bbffc63b0bb6f452f3e5777b0bff4c60591d04

    SHA512

    c7a97122566dca1fa371f378c337261975ef869483c5fb5ed0655cee4022c7f7d4cbd860506b5cda33df961cdf9e69343c8e62708dd307c14d5c535a760c8aea