Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2025, 15:11

250325-skmbpsxzaw 10

25/03/2025, 15:06

250325-sg1d6a1px2 10

25/03/2025, 15:01

250325-sd5jpsxyct 10

25/03/2025, 14:56

250325-sbdcfaxxgs 10

25/03/2025, 14:50

250325-r7ve6a1nv3 10

25/03/2025, 14:46

250325-r5ab7sxwhx 10

25/03/2025, 14:40

250325-r2c9paxwe1 10

05/02/2025, 10:25

250205-mgcefaslhw 10

05/02/2025, 10:17

250205-mbs51atmbk 10

05/02/2025, 09:15

250205-k785zs1pfn 10

Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 14:56

General

  • Target

    RansomwareSamples/NetWalker_19_10_2020_903KB.ps1

  • Size

    902KB

  • MD5

    7770c598848339cf3562b7480856d584

  • SHA1

    b3d39042aab832b7d2bed732c8b8e600a4cf5197

  • SHA256

    ee3b0468a16789da8706d46aa361049ec51586c36899646a596b630d913e7304

  • SHA512

    02af6d5910f0627074fbea72901b2f2b491f7dba58f53ae1fad1dc47230e000a7b459c8475a76aaf006629bb5822d89d4672d32fb64d073464ca41140cb134d2

  • SSDEEP

    6144:KxYcCQ2x63Ib0NQrqxpPbI1ZVedvUhwDNGjG+zBumDKemdglhykA:KCQ2x6TdvUqDUjG+zBumDKemdgy9

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft.NET\RedistList\CB44AA-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .cb44aa -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, you must know that your sensitive data has been stolen by our analyst experts and if you choose to no cooperate with us, you are exposing yourself to huge penalties with lawsuits and government if we both don't find an agreement. We have seen it before; cases with multi million costs in fines and lawsuits, not to mention the company reputation and losing clients trust and the medias calling non-stop for answers. Come chat with us and you could be surprised on how fast we both can find an agreement without getting this incident public. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_cb44aa: LvjmgJWkWZ8vOSWgtxGNIiTEHJ4IrbxqoTk+q3W96yS2Urk94R SZZPJlctaQD9vrajlhT9KR8MMswubvbkoqM0QhFTV4tL5hkTQh 0piqRMttXonCf0ezwaWdhvYlfKWTsZP5O6Q8T8mB0usPjyRadi G2ug1V09l5owvRgmjXR8gqhXUy+jQIcRhoBGkFEo1ffZnKyTud 4MxH2peeNF1SCE4rNhP/uJjX5dihkhyUXe11CDGDVcTOBl8LS2 uTTMj4YHuDNdp/LAe3FPXwuM1+mxrwTXKkpc9B5w==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Netwalker family
  • Renames multiple (277) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1256
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\NetWalker_19_10_2020_903KB.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1kvu-rqk.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5311.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5300.tmp"
          4⤵
            PID:2716
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iofosukn.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5EE3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5EE2.tmp"
            4⤵
              PID:3056
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:432

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft.NET\RedistList\CB44AA-Readme.txt

        Filesize

        2KB

        MD5

        bb3b9e6c63d5dc8f11a983846430859e

        SHA1

        e547c67bc2248bd30c080b029df7ba95817d679f

        SHA256

        aa53ba8cfdf96a16c7c9418fb238548c73b7bd7199d9ebb068fe92364261d148

        SHA512

        e2ef09151748d172b5b50a89196202b073600b26095f8a826ea4295b3c059f3e69716d4a55311fc81cc570b39ee0624d95290cce81e68a4e2583cda6329ca436

      • C:\Users\Admin\AppData\Local\Temp\1kvu-rqk.dll

        Filesize

        6KB

        MD5

        d0957ed8f69df4467cd6316b96476e92

        SHA1

        e199e09d7625caffd169073095022d2e42592884

        SHA256

        c994c0bd9cf5d94742b2058ecfb43e72964ff147be903c71de48837d38a3cdc7

        SHA512

        5fa048291572c3177c4823d0e4261c5edadc140c4b74a9bd5a8340599786c66e8f523ec5a1fe64a5bcd4128971c54932ef0b9076c255210900d5b4c96aab4720

      • C:\Users\Admin\AppData\Local\Temp\1kvu-rqk.pdb

        Filesize

        7KB

        MD5

        f59b31f3594fa3d9d2864dd48cfb6fc9

        SHA1

        a414d303d393a393f374b71bce843207b53481ef

        SHA256

        fc6fe8506c9e1d74b77180476ff6dbf1a956daff0081fcdc9696829742b19283

        SHA512

        dd21f35834b52326c263139b0fe7d75fe08e48bebc0b5d677f156065eee907ed638ea2a7630e9494903d7442ed655be8960b6df575c0384adda2b9dc522da3a7

      • C:\Users\Admin\AppData\Local\Temp\RES5311.tmp

        Filesize

        1KB

        MD5

        887217110cf5c0960efdf966f4eadee6

        SHA1

        3e7130b753afcd7200930bd865dbdfa648529053

        SHA256

        b56a43268c0c776efef856283d45f510d7c66cfc68e2c9046d6f3e11f6209cd1

        SHA512

        36f6a928903c6bda39ab406fa0c250173d2ed02ad7a1c5a38053bef3acfe6c1d538231cf64b7aade2774e52c0c824664db797f641a1399529f21bc97f1862818

      • C:\Users\Admin\AppData\Local\Temp\RES5EE3.tmp

        Filesize

        1KB

        MD5

        bd774083ed1ae831411eb13debd4ae88

        SHA1

        f5d2911e96bdd41725c4754d8d9382af8406ecb9

        SHA256

        9926f385bd0d88195f60a58b74f033493159a86ce94525cd270b1f7918d52b1b

        SHA512

        1179a9062378f3f41bf0ccfc6eb26662c78de992b35f64112dcdcc3db77312ceb658765dfb68f02a25be74604e67909e038e76bd17229be082fad1d9f598f13c

      • C:\Users\Admin\AppData\Local\Temp\iofosukn.dll

        Filesize

        4KB

        MD5

        edb9427166e7aca461d9ba174c8df1ab

        SHA1

        37944158325a3404a28173541ddd495365773c21

        SHA256

        8b1059915387e359d243269b5fc3ff1a7d0020729723ced481b1d24ba09d48ea

        SHA512

        0b0f55aefd86259881f47e4ea04224ba698c86fb5163e8a68f45e71c120f8cd0806be4ec6928c0a9f956a99254f170468229538b6eb7e46678c799c63b7d405c

      • C:\Users\Admin\AppData\Local\Temp\iofosukn.pdb

        Filesize

        7KB

        MD5

        3c8f8dd2ca60938c52beb7ef703db18b

        SHA1

        e4678e3ee361342c991ad838a14b4e7ef23daf27

        SHA256

        1e656eb51c5cd33595ea600de1c795182b048ce1579346be714b081bccb737dd

        SHA512

        8a4b83c2e76a5c2e298f1d9fd5c85bc1c20fedd014ab1884b5af2f5eb3894986791353bf8fbd826d94bce2f1df01c9805e3a725a1eb41813c27cd9026f32036a

      • \??\c:\Users\Admin\AppData\Local\Temp\1kvu-rqk.0.cs

        Filesize

        9KB

        MD5

        64db54f88f46e2ecc57b05a25966da8e

        SHA1

        488dbbbab872714609ded38db924d38971a3685f

        SHA256

        e2b586aa1613682b4f1b92f981fea15d0612a3e632bbd73cd7287518c9ed7cb5

        SHA512

        8791b75874fd7a90bf63742abe6d299bc4370ad910591207d7630901d80765f6f6a4475809f23becf112360403423d0c691744f1024af3dd89c104f2b0b9e729

      • \??\c:\Users\Admin\AppData\Local\Temp\1kvu-rqk.cmdline

        Filesize

        309B

        MD5

        0bd3725af39ef70dc607e46edeeec124

        SHA1

        b166ecdd26df2dc3862299eefe4e396d53ec19f1

        SHA256

        2898acbda77ca8cb66cb361fcec8fc4a5316635ea9552c1bfffb4a63bd88c759

        SHA512

        f2805d4b4ef3658c9eea292f46f5d0c5329cad1f0911385c18554f2b711c85b1e0389d6939af06f652ff4517f8f5fd9923848ff59f22e775a34947f7d3a70052

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC5300.tmp

        Filesize

        652B

        MD5

        901d10909c1bfe91e25430a7263bb293

        SHA1

        5b700cb86b8b7baee1cb5cf7c1131defa8d38c82

        SHA256

        ca81e5f1b69e48dcefd1a97beb4c198e7bfb41e0b66390a2d9c7346cf94b9860

        SHA512

        cf1a3fd0e2fadfb535deb772d6cb1be0fde244a275eee03069a06bfc9fc1f9e02b0dbf26bc548ba63eebc2a7dc3e77eeed0bc0a95b9036e3fcbbb48d4d328a2b

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC5EE2.tmp

        Filesize

        652B

        MD5

        e7318bb39bd53298d3548ec60b83cbcf

        SHA1

        ce4f920ea4a8f8830e837637190c4f00491f0d5d

        SHA256

        7cfddc2a03748ce33b503f1c1c0baff6d02bdf09287284aabdb7eb6e3bf9dee9

        SHA512

        b4fd9a22c1b8ca23e44aa0584535b787f438dcb98ea2356a720e44a0919e42944a99ba8820e04cb5482da47c56050a9258bf1801c3276030cd301ed284ae52ec

      • \??\c:\Users\Admin\AppData\Local\Temp\iofosukn.0.cs

        Filesize

        2KB

        MD5

        1cae52936facd4972987d3baef367d8d

        SHA1

        ad2b4b58d20f290b9da416cef1ef305cf1df6781

        SHA256

        28b45e56fb27763b4785974e380c96eef1436fc151a802f492db25052392d400

        SHA512

        4ae36c0ac78177eea5a6e0fbab0f51f7d24c7a76eae75b67eab41fcace921cef256b02fb088e1afb3c445e59598fbea73270e6bca1eda32514221190daa501df

      • \??\c:\Users\Admin\AppData\Local\Temp\iofosukn.cmdline

        Filesize

        309B

        MD5

        de75baade6331a600103544f5b190696

        SHA1

        f88684d514f92af4733acf7b8ce96b7ca869481b

        SHA256

        76ee817be0bb1eb1e9200d908788787c9c152267ebb10b5587e6e216b121e571

        SHA512

        658f662fd9a5222ad31301bffa09c4bb57214d23aeacaa320912d28fd7523921e43a3cf54da1acd714b8d5f1a76aa1e2f118f7f06b90b913d2d6c876b31daab5

      • memory/1256-88-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-82-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-65-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-66-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-67-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-73-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-68-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-69-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-70-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-71-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-104-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-74-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-75-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-59-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-76-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-77-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-78-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-79-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-80-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-83-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-84-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-85-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-86-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-62-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-72-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-87-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-113-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-112-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-111-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-110-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-109-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-107-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-106-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-103-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-102-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-101-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-100-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-99-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-98-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-97-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-96-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-89-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-95-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-94-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-93-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-92-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-91-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/1256-90-0x00000000029E0000-0x0000000002A02000-memory.dmp

        Filesize

        136KB

      • memory/2772-53-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-45-0x000000001B6A0000-0x000000001B6A8000-memory.dmp

        Filesize

        32KB

      • memory/2772-4-0x000007FEF58FE000-0x000007FEF58FF000-memory.dmp

        Filesize

        4KB

      • memory/2772-7-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

        Filesize

        32KB

      • memory/2772-6-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-8-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-60-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-1724-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-9-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-48-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-5-0x000000001B140000-0x000000001B422000-memory.dmp

        Filesize

        2.9MB

      • memory/2772-52-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-51-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-11366-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-10-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-56-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-1319-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-49-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-50-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-11-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-31-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2772-30-0x000007FEF58FE000-0x000007FEF58FF000-memory.dmp

        Filesize

        4KB

      • memory/2772-54-0x000000001B9D0000-0x000000001B9F2000-memory.dmp

        Filesize

        136KB

      • memory/2772-27-0x000000001B600000-0x000000001B608000-memory.dmp

        Filesize

        32KB

      • memory/2980-25-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB

      • memory/2980-17-0x000007FEF5640000-0x000007FEF5FDD000-memory.dmp

        Filesize

        9.6MB