Analysis

  • max time kernel
    1816s
  • max time network
    1819s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 02:36

General

  • Target

    Loader.exe

  • Size

    139.5MB

  • MD5

    8fa1144ef7c7e9ff74df8d18a08af392

  • SHA1

    8c6bdf47395b29030fc520be3b2c07de6caf653f

  • SHA256

    2ab58d0da204479a94cfa67361c688119e5ae20b967fd0d36ac93d7abe163191

  • SHA512

    0e4152be8b8d0d223b1a6c7d94246f81206cbd1f7eba16c32b19d112c02e24713a87801e87a0245ab2d4b89ab66a657d39c18480f2e5273afd0d6db82f74cf22

  • SSDEEP

    786432:X14w5ThzHwQBgmoLWv+K18nCzKdo5DTdvfMQr6SSmPuvh8tSIW68:X14kpHwQjCWv+K18CedmVvEQEpcJW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
    • C:\Users\Admin\AppData\Local\Temp\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1036 --field-trial-handle=1160,11925140341972151820,18262357793449803076,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2324
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=2648 get ExecutablePath"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where processid=2648 get ExecutablePath
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1484
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
          PID:2996
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            PID:1036
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "net session"
          2⤵
            PID:3012
            • C:\Windows\system32\net.exe
              net session
              3⤵
                PID:1988
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 session
                  4⤵
                    PID:1780
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\bind\main.exe"
                2⤵
                  PID:1652
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                  2⤵
                    PID:368
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:660
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"
                    2⤵
                      PID:2756
                      • C:\Windows\system32\more.com
                        more +1
                        3⤵
                          PID:1748
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic OS get caption, osarchitecture
                          3⤵
                            PID:456
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"
                          2⤵
                            PID:1688
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic cpu get name
                              3⤵
                                PID:2304
                              • C:\Windows\system32\more.com
                                more +1
                                3⤵
                                  PID:1752
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"
                                2⤵
                                  PID:1760
                                  • C:\Windows\system32\more.com
                                    more +1
                                    3⤵
                                      PID:2352
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic PATH Win32_VideoController get name
                                      3⤵
                                      • Detects videocard installed
                                      PID:3052
                                  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Loader.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --mojo-platform-channel-handle=1076 --field-trial-handle=1160,11925140341972151820,18262357793449803076,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1936
                                  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Loader.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1604 --field-trial-handle=1160,11925140341972151820,18262357793449803076,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                    2⤵
                                      PID:780
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                      2⤵
                                        PID:1864
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1196

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • \Users\Admin\AppData\Local\Temp\4dc6cca3-8516-44af-b16b-4468aa8c8172.tmp.node

                                      Filesize

                                      643KB

                                      MD5

                                      cc9ed377ba027cfa898986f63b76b051

                                      SHA1

                                      b8205ff032927abc7cd3e5d4e394709cc38fa450

                                      SHA256

                                      12bf581c70d7ce4cbeb3600a48cdfaed9fa5629ca2ee3fa91cc06543b2110cb9

                                      SHA512

                                      1bf4fa6585d77b577eabb97c6ca35ab81f613f81d6257cfcadfd33f346f4309aeba2fdde87988f9c73c340d414d44561f6fc7526a929633e69b4c7da008bb24e

                                    • \Users\Admin\AppData\Local\Temp\83b54488-25cb-4c75-a788-38c540c3a4c3.tmp.node

                                      Filesize

                                      663KB

                                      MD5

                                      3aa0737411524cd5ae047ea0b8203930

                                      SHA1

                                      da3759832aa59a625c99c8546bf4e40dc8ce7c71

                                      SHA256

                                      1e46668d4196996c83a87173d30893720fd7046086b7b24ecd6ba3f3ecfcead3

                                      SHA512

                                      997f50e00164c5f8b3f7ba08911a8b58383260f16c95bde20f29f3bee8140e674adf93ca5bcd33dc9e23cd9ba7793e8206846692ac37ca63470ad7e4e19974f2

                                    • \Users\Admin\AppData\Local\Temp\e9a74cbe-b9bb-4fbb-b70d-47c6acb78600.tmp.node

                                      Filesize

                                      1.8MB

                                      MD5

                                      3072b68e3c226aff39e6782d025f25a8

                                      SHA1

                                      cf559196d74fa490ac8ce192db222c9f5c5a006a

                                      SHA256

                                      7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                      SHA512

                                      61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                    • memory/1196-107-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-105-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-100-0x000000001B1A0000-0x000000001B482000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/1196-102-0x00000000022F0000-0x00000000022F8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1196-101-0x000007FEF2640000-0x000007FEF2FDD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/1196-103-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-104-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-114-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-106-0x000007FEF2640000-0x000007FEF2FDD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/1196-113-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-110-0x000007FEF2640000-0x000007FEF2FDD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/1196-111-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/1196-112-0x00000000029C0000-0x0000000002A40000-memory.dmp

                                      Filesize

                                      512KB

                                    • memory/2324-13-0x0000000000060000-0x0000000000061000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2324-45-0x0000000076CC0000-0x0000000076CC1000-memory.dmp

                                      Filesize

                                      4KB