Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
2025-03-07_c51371985338a5d7c20214c6a45e38f9_babuk_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-07_c51371985338a5d7c20214c6a45e38f9_babuk_mailto.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-07_c51371985338a5d7c20214c6a45e38f9_babuk_mailto
-
Size
54KB
-
MD5
c51371985338a5d7c20214c6a45e38f9
-
SHA1
8a2be2d5b3c048bf290bd557b2c2229b4324285b
-
SHA256
dd5f992cbf24af00bfd4e87870106a72470ffb17cf035f914f2404bd5f09c469
-
SHA512
c10da4b3c8d699decab8210b4de4807508af3e07f87aa2ef9c7c814fa55c2681211dc12fba4208d4347c9d6caa246a44dde602f67ebe4144ba418eeafa529dbf
-
SSDEEP
768:OnJr+Opk+ptC7j/zz6GGGqoSEr3e8TDPF+87IKdNMAkRj7kTfx:aS10ty2XGy0T7BdERjw
Malware Config
Signatures
-
Detected Netwalker Ransomware 1 IoCs
Detected unpacked Netwalker executable.
resource yara_rule sample netwalker_ransomware -
Netwalker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-03-07_c51371985338a5d7c20214c6a45e38f9_babuk_mailto
Files
-
2025-03-07_c51371985338a5d7c20214c6a45e38f9_babuk_mailto.exe windows:6 windows x86 arch:x86
5b31ac8cdf313aa6e4513e902c6f0c0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpyW
lstrcatW
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
WriteFile
CloseHandle
GetCommandLineW
FindClose
FindFirstFileW
GetProcessHeap
GetLogicalDriveStringsW
SetErrorMode
WaitForMultipleObjects
ExitProcess
CreateThread
GetComputerNameExW
LoadResource
LockResource
SizeofResource
lstrcmpW
lstrcmpiW
lstrlenW
FindResourceA
GetFileSize
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
HeapFree
HeapReAlloc
FindNextFileW
HeapAlloc
user32
EnableWindow
GetSystemMetrics
UpdateWindow
SetActiveWindow
SetWindowTextA
SetWindowTextW
DestroyWindow
IsDlgButtonChecked
MessageBoxW
LoadCursorW
CreateWindowExW
TranslateMessage
GetMessageW
wsprintfW
RegisterClassW
CheckDlgButton
SetWindowPos
GetWindowRect
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
GetWindowTextW
DispatchMessageW
gdi32
CreateFontW
comdlg32
GetOpenFileNameW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHBrowseForFolderW
mpr
WNetUseConnectionW
WNetAddConnection2W
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ