Analysis

  • max time kernel
    25s
  • max time network
    25s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-08-2024 21:05

General

  • Target

    newloader.exe

  • Size

    7.3MB

  • MD5

    b69a767cc752e3c726dc73bc3468d39f

  • SHA1

    48d69637e16a95c691df78a583253bf80fb7fa91

  • SHA256

    a240e43b8d0089d098cd6897f6c3c08ae18042148f71aefb1045fab65fad4cb3

  • SHA512

    daf2ec9662ce91be17c80077e549fe6c6b2e52598daa8a3e62b2e8e0d13726b23cac5e1a857366fb2f13a6f5f6106ba27ed44d382da2d8f6e7a5788ced0ad832

  • SSDEEP

    196608:08kNVlwLeFadXTsS/nr32CMk3Q65J/UQSG5eM:lEnw/dDsSD32IQ651B5e

Score
1/10

Malware Config

Signatures

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\newloader.exe
    "C:\Users\Admin\AppData\Local\Temp\newloader.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Description
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic PATH Win32_VideoController GET Description
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2876
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET PNPDeviceID
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic PATH Win32_VideoController GET PNPDeviceID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET AdapterCompatibility
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic PATH Win32_VideoController GET AdapterCompatibility
        3⤵
          PID:2624
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET AdapterRAM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic PATH Win32_VideoController GET AdapterRAM
          3⤵
            PID:1316
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Name
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4932
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic PATH Win32_VideoController GET Name
            3⤵
            • Detects videocard installed
            PID:2524
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET VideoProcessor
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3816
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic PATH Win32_VideoController GET VideoProcessor
            3⤵
              PID:1876
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:2956
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
              PID:1932
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004EC
              1⤵
                PID:3744

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2572-0-0x0000000140000000-0x000000014075D000-memory.dmp

                Filesize

                7.4MB

              • memory/2572-3-0x00000000021F0000-0x0000000002262000-memory.dmp

                Filesize

                456KB

              • memory/2572-5-0x00000000021F0000-0x0000000002262000-memory.dmp

                Filesize

                456KB

              • memory/2572-1-0x00000000020C0000-0x00000000020C1000-memory.dmp

                Filesize

                4KB

              • memory/2572-6-0x00000000021F0000-0x0000000002262000-memory.dmp

                Filesize

                456KB

              • memory/2572-19-0x00000000022A0000-0x00000000024A8000-memory.dmp

                Filesize

                2.0MB

              • memory/2572-21-0x00000000024D0000-0x00000000026D9000-memory.dmp

                Filesize

                2.0MB

              • memory/2572-47-0x0000000002640000-0x00000000029B4000-memory.dmp

                Filesize

                3.5MB

              • memory/2572-38-0x0000000002390000-0x000000000244D000-memory.dmp

                Filesize

                756KB

              • memory/2572-23-0x00000000024D0000-0x00000000026D9000-memory.dmp

                Filesize

                2.0MB

              • memory/2572-34-0x00000000022A0000-0x0000000002361000-memory.dmp

                Filesize

                772KB

              • memory/2572-36-0x0000000002390000-0x000000000244D000-memory.dmp

                Filesize

                756KB

              • memory/2572-45-0x00000000022A0000-0x000000000261C000-memory.dmp

                Filesize

                3.5MB

              • memory/2572-60-0x0000000002360000-0x00000000023F1000-memory.dmp

                Filesize

                580KB

              • memory/2572-58-0x0000000002360000-0x00000000023F1000-memory.dmp

                Filesize

                580KB

              • memory/2572-56-0x00000000022A0000-0x0000000002334000-memory.dmp

                Filesize

                592KB

              • memory/2572-49-0x0000000002640000-0x00000000029B4000-memory.dmp

                Filesize

                3.5MB