Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 16:30
Behavioral task
behavioral1
Sample
2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe
-
Size
69KB
-
MD5
2edbacd070d1949bb5d97d3a6e4e23f6
-
SHA1
761168968a1d951848a36ad428ee4d05153f1e01
-
SHA256
8894b6508e7b3d8759a53d0ac7a6ceb39fd63ba65b1e89be62b2acdce7781fdc
-
SHA512
a4b282b8c91124a6dc465573842a03b5fcf346af6e561eef66ea405fcb784251044e2f8a2c0a61cbb0e29f7efc02a71d131930b70e2c021978d00c0b3c38f344
-
SSDEEP
1536:juCWRxL7hbUiQfovecnXUU+hhOZuIWiFp+ZfaBZebC33O+MEYTb:KCWf7VJQfmeMXvkhOZu1iFBBZebC3+
Malware Config
Extracted
C:\Program Files\VideoLAN\VLC\lua\sd\4D0BA2-Readme.txt
netwalker
http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7370) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 6236 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-utilities.xml 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin_2.0.100.v20131209-2144.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107266.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00523_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\bg.pak 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\FrameworkList.xml 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.TH.XML 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Rio_Gallegos 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Zaporozhye 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.reconciler.dropins.nl_ja_4.4.0.v20140623020002.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00453_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_spellcheck.gif 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02285_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Groove Starter Template.xsn 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187881.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Country.css 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187647.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101857.BMP 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCINFO.XML 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\4D0BA2-Readme.txt 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14531_.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Davis 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\4D0BA2-Readme.txt 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Palau 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Enderbury 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0237228.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02252_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql.nl_zh_4.4.0.v20140623020002.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01560_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\vlc.mo 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Aspect.xml 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\4D0BA2-Readme.txt 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.ui.zh_CN_5.5.0.165303.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00046_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195772.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tokyo 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02759J.JPG 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File created C:\Program Files\VideoLAN\VLC\lua\http\4D0BA2-Readme.txt 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_K_COL.HXK 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl.css 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00105_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.expressions_3.4.600.v20140128-0851.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099157.JPG 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Black Tie.xml 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\TOOT.WAV 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18228_.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kiev 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\TAB_OFF.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR18F.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR16F.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0324694.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\Java\jre7\lib\jce.jar 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\NUMERIC.JPG 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105230.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00164_.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RESP98.POC 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR48F.GIF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309480.JPG 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099148.JPG 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152610.WMF 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\vlc.mo 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\4D0BA2-Readme.txt 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana.css 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2100 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 6276 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe Token: SeImpersonatePrivilege 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe Token: SeBackupPrivilege 2364 vssvc.exe Token: SeRestorePrivilege 2364 vssvc.exe Token: SeAuditPrivilege 2364 vssvc.exe Token: SeDebugPrivilege 6276 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2100 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2 PID 2860 wrote to memory of 2100 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2 PID 2860 wrote to memory of 2100 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2 PID 2860 wrote to memory of 2100 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 2 PID 2860 wrote to memory of 8940 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 35 PID 2860 wrote to memory of 8940 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 35 PID 2860 wrote to memory of 8940 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 35 PID 2860 wrote to memory of 8940 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 35 PID 2860 wrote to memory of 6236 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 36 PID 2860 wrote to memory of 6236 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 36 PID 2860 wrote to memory of 6236 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 36 PID 2860 wrote to memory of 6236 2860 2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe 36 PID 6236 wrote to memory of 6276 6236 cmd.exe 38 PID 6236 wrote to memory of 6276 6236 cmd.exe 38 PID 6236 wrote to memory of 6276 6236 cmd.exe 38 PID 6236 wrote to memory of 6276 6236 cmd.exe 38 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet1⤵
- Interacts with shadow copies
PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_2edbacd070d1949bb5d97d3a6e4e23f6_mailto.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\4D0BA2-Readme.txt"2⤵PID:8940
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\C37E.tmp.bat"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:6236 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 28603⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6276
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e317f50a3f094e65d2c4daf9eb68a51
SHA1d6d3e272117a54b2c47f9c850a21f305c4d9ada1
SHA25607457a91d0ed9541551d823ba45483aff1ab7d6d3378079fe99a5bd65cfa9e06
SHA512a134a87d277d543a880befc906ca6557ed121293f9357431eaabfe7b90824d5d1f5316a2987361c4cb696f4c9cd8f248ee52c74a27ba836e72bbeb27df88bc8b
-
Filesize
12KB
MD5b2682a9f1fb7cfd6fa75c5a69b6f1307
SHA1b3f4cf69e167502575201b0474a316b25440543f
SHA2561e168c97cb2f656e50754fc730ba95ba53c8ec0a911b0725c1de62f0b62fcb7a
SHA512bec1ba30dd04ce4d2dc2cb7d2455385d6be9a22d875b93b3c2ff974fa96cf03f1abdadf58377fc7ba0a271ef28c8920738efd0bdf34e5a75ff9acb07a092ea50
-
Filesize
229KB
MD53e62189811b8166f287de5dd1f11aa1b
SHA107c3767f5878bd48c807de85084e9e6864716e39
SHA2568fc98469ca211bae34a06358e1b4977b223875cd36c25dc42790af630bcf2aed
SHA5120ec67ae0375efbf9bf94fcb84737730897fcac25df9dff5981e9161c1f242a4ccdb2b97ce494a12645274d1f6dd4eeef8cd2868813a76fe8905e00246040da94
-
Filesize
491KB
MD52486ccc4f054ddd1c5e974f6a93e9d2d
SHA1da3e286d6438fe75d6581562ebe99d21ef1c4be0
SHA2565f7a38f0c8dddefc3da8dd48b3579446462ac92b42f2c0a6f7431ff71cd46b04
SHA5128c3ba393d33357f0dabb7ef618ca0d2b163a3cf45f994cb05319f4c45c863388fb0631a5287d189e55c2a21c8808dbd67658c2b7af94da3268af06b91bbc9ffa
-
Filesize
14KB
MD584a54df477643c2584209791cab017f7
SHA1e122af73a0c38456d24949e158bfe97460b93b91
SHA25616a95124fd61587a1b66edc3f9ec753340892ca8a9e4793a34fd6f920dcf8904
SHA5126a0442e84a774fee11147853e311f9aff297d869d47b62acc8482398e9d6a591d32ebdea46bcecebe61615a08dbd8642ae83152d7a154f640b89ecf4daa26f9e
-
Filesize
284B
MD53640b4a19256bbe87558a18dfe96c0ae
SHA1cab6ba10f4e842394c2754f47e1687f8d87d06e7
SHA256a3771b81248d7b4aac1ad287825ac469499fa7a48eb1503caea895749bfd3a45
SHA512acf970ce24dd1798e942af9ab1c26184119bb38644df66977baf56da02d65be84d664e02027fe293d257d900243ea19b8824e410a8cb990a3dd6cf9269fc2057
-
C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help{9DAA54E8-CD95-4107-8E7F-BA3F24732D95}.H1Q.4d0ba2
Filesize864KB
MD5ffaa95c46928b0570b4f877301975ed3
SHA19146e4fc257d8169034c178147211dbe8478eeb4
SHA256e4ccf24c99de1e1489f1d4f0675ea17171b6349a2db9a198fd9b3c655cddc3b2
SHA5124b0f4cce21e067b174e43128b1e33e812972111bcf497eda09dd51655b4b0e0ea7e4c88b9eee419ad990bf66ffb9d15d1ddd9f5099df3d18eaf296359803bf0c
-
Filesize
127B
MD5da7687fa3d7ea026d0f5ec80f410a1ff
SHA180f3737ae2e62cb0a7149bb59691ed7b2bdd88f5
SHA2569e80f4110f720a86733d9b84a0fe7ef5df633c67afca8be8ac995484d183ca97
SHA512c7d023eaf85a11b182c3bbc97dde5fe28e73843a4aa2decd7c400ecb274532560be4309407b31aab1fd1189f930d8b09a22ee9dd6e36dce6013706f924d87316