Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 00:24
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe
-
Size
66KB
-
MD5
2be2af23b313b80536e9ca3c12704d6c
-
SHA1
5ce36159fb34f79df9bd8ba43afb8c21a059052c
-
SHA256
16e6fc7f6bf936eda5723551ea9d0aee9d83e265c1e70cc2d66198be8e1400d8
-
SHA512
384b55e59933ca35a4f6db970e6ac1169e016b40739c7b15f4a592e11fff8c7d4afa730cd2b0b78ad1ea18e29c881028228683b55742be76bbae65102be08853
-
SSDEEP
1536:Tn2v0CaaFjJn/zk4XHnnzxLhOZ3w4qwiDKKVqmfeL:TIK+N/44XHnzthOZ37qwiDo
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Office14\3082\367114-Readme.txt
netwalker
http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion
Signatures
-
Netwalker Ransomware
Ransomware family with multiple versions. Also known as MailTo.
-
Netwalker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7436) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2372 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02227_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL108.XML 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console_1.0.300.v20131113-1212.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199307.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0294991.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryResume.dotx 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL026.XML 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387578.JPG 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\utilityfunctions.js 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00915_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152610.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200377.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00183_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VS_ComponentSigningIntermediate.cer 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB3A.BDR 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02265_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\core_ja.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105328.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152704.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153299.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185786.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00168_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_joined.gif 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files\Java\jre7\lib\deploy\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB1B.BDR 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00351_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiling.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLAPPTR.FAE 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Cape_Verde 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18229_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-lookup.xml 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03379I.JPG 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.UK.XML 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0293800.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00241_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse.nl_ja_4.4.0.v20140623020002.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HEADER.GIF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105376.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck.css 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105378.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00512_.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02752U.BMP 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives_1.1.100.v20140523-0116.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\SPACER.GIF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.services.nl_zh_4.4.0.v20140623020002.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\VERSION.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\367114-Readme.txt 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\La_Rioja 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_center.gif 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152600.WMF 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 540 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 648 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe Token: SeImpersonatePrivilege 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe Token: SeBackupPrivilege 3412 vssvc.exe Token: SeRestorePrivilege 3412 vssvc.exe Token: SeAuditPrivilege 3412 vssvc.exe Token: SeDebugPrivilege 648 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2900 wrote to memory of 540 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 31 PID 2900 wrote to memory of 540 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 31 PID 2900 wrote to memory of 540 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 31 PID 2900 wrote to memory of 540 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 31 PID 2900 wrote to memory of 1524 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 36 PID 2900 wrote to memory of 1524 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 36 PID 2900 wrote to memory of 1524 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 36 PID 2900 wrote to memory of 1524 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 36 PID 2900 wrote to memory of 2372 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 37 PID 2900 wrote to memory of 2372 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 37 PID 2900 wrote to memory of 2372 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 37 PID 2900 wrote to memory of 2372 2900 2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe 37 PID 2372 wrote to memory of 648 2372 cmd.exe 39 PID 2372 wrote to memory of 648 2372 cmd.exe 39 PID 2372 wrote to memory of 648 2372 cmd.exe 39 PID 2372 wrote to memory of 648 2372 cmd.exe 39 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_2be2af23b313b80536e9ca3c12704d6c_mailto.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:540
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\367114-Readme.txt"2⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\AB7B.tmp.bat"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 29003⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5849de66936e304b7210c16ef8b4c1787
SHA1db05f252a9d9cea3e6cf723a6b4e7b829a33cfd5
SHA2564a2f649e14a0a1a86a52e77ff54b5d2e5483fd9d95b72383aab703995ffe5b53
SHA512ba725b952ac11206bc929f3ef4b75ccb98f79f591d6ad7eee0c6381afb8bbbc0ba1485be3a46f4b26e73c254ac018961b7bf259f4d053b502abf77ed685ebfc5
-
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\CiPT0000.000.367114
Filesize506B
MD51169f4e615b8287c9b9cba01459f67ff
SHA1e15c939244d187db8a988d0c7d5936ca895eca39
SHA256df185c05bea0f5763194ea996d80ecdaa88f79e0d0125aedc838307242f01892
SHA512f90438d9e37d5d2e6da1a2620ef5508ae5cc9f71146ebb5b27bbd318a3f872e79ff527ba37f4b87a060a39e125ac907d1c2d6f1e1ec7ff84011bbb5d78c2bd1d
-
Filesize
127B
MD532b53c9f41bd6b6d1e659b6d37c67d5a
SHA1453d5eccc0623c7893c3b7789b2b137dacebda91
SHA25645dbe7bf54d40b6fea096bedf6b615825b05b5e7af89c53665192ae22458abfe
SHA51217caa2b343eb0d53f9539fbd028c9906a0d613be80df8cc81af322c741f5e41a3191f9140f533df1a929f3600deed667a71ac73aed1962af12dc8a3b49ab98c6