Analysis
-
max time kernel
25s -
max time network
25s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-08-2024 21:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
newloader.exe
Resource
win11-20240802-en
windows11-21h2-x64
5 signatures
150 seconds
General
-
Target
newloader.exe
-
Size
7.3MB
-
MD5
b69a767cc752e3c726dc73bc3468d39f
-
SHA1
48d69637e16a95c691df78a583253bf80fb7fa91
-
SHA256
a240e43b8d0089d098cd6897f6c3c08ae18042148f71aefb1045fab65fad4cb3
-
SHA512
daf2ec9662ce91be17c80077e549fe6c6b2e52598daa8a3e62b2e8e0d13726b23cac5e1a857366fb2f13a6f5f6106ba27ed44d382da2d8f6e7a5788ced0ad832
-
SSDEEP
196608:08kNVlwLeFadXTsS/nr32CMk3Q65J/UQSG5eM:lEnw/dDsSD32IQ651B5e
Score
1/10
Malware Config
Signatures
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2524 WMIC.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2572 newloader.exe 2572 newloader.exe 2572 newloader.exe 2572 newloader.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2876 WMIC.exe Token: SeSecurityPrivilege 2876 WMIC.exe Token: SeTakeOwnershipPrivilege 2876 WMIC.exe Token: SeLoadDriverPrivilege 2876 WMIC.exe Token: SeSystemProfilePrivilege 2876 WMIC.exe Token: SeSystemtimePrivilege 2876 WMIC.exe Token: SeProfSingleProcessPrivilege 2876 WMIC.exe Token: SeIncBasePriorityPrivilege 2876 WMIC.exe Token: SeCreatePagefilePrivilege 2876 WMIC.exe Token: SeBackupPrivilege 2876 WMIC.exe Token: SeRestorePrivilege 2876 WMIC.exe Token: SeShutdownPrivilege 2876 WMIC.exe Token: SeDebugPrivilege 2876 WMIC.exe Token: SeSystemEnvironmentPrivilege 2876 WMIC.exe Token: SeRemoteShutdownPrivilege 2876 WMIC.exe Token: SeUndockPrivilege 2876 WMIC.exe Token: SeManageVolumePrivilege 2876 WMIC.exe Token: 33 2876 WMIC.exe Token: 34 2876 WMIC.exe Token: 35 2876 WMIC.exe Token: 36 2876 WMIC.exe Token: SeIncreaseQuotaPrivilege 2876 WMIC.exe Token: SeSecurityPrivilege 2876 WMIC.exe Token: SeTakeOwnershipPrivilege 2876 WMIC.exe Token: SeLoadDriverPrivilege 2876 WMIC.exe Token: SeSystemProfilePrivilege 2876 WMIC.exe Token: SeSystemtimePrivilege 2876 WMIC.exe Token: SeProfSingleProcessPrivilege 2876 WMIC.exe Token: SeIncBasePriorityPrivilege 2876 WMIC.exe Token: SeCreatePagefilePrivilege 2876 WMIC.exe Token: SeBackupPrivilege 2876 WMIC.exe Token: SeRestorePrivilege 2876 WMIC.exe Token: SeShutdownPrivilege 2876 WMIC.exe Token: SeDebugPrivilege 2876 WMIC.exe Token: SeSystemEnvironmentPrivilege 2876 WMIC.exe Token: SeRemoteShutdownPrivilege 2876 WMIC.exe Token: SeUndockPrivilege 2876 WMIC.exe Token: SeManageVolumePrivilege 2876 WMIC.exe Token: 33 2876 WMIC.exe Token: 34 2876 WMIC.exe Token: 35 2876 WMIC.exe Token: 36 2876 WMIC.exe Token: SeIncreaseQuotaPrivilege 3000 WMIC.exe Token: SeSecurityPrivilege 3000 WMIC.exe Token: SeTakeOwnershipPrivilege 3000 WMIC.exe Token: SeLoadDriverPrivilege 3000 WMIC.exe Token: SeSystemProfilePrivilege 3000 WMIC.exe Token: SeSystemtimePrivilege 3000 WMIC.exe Token: SeProfSingleProcessPrivilege 3000 WMIC.exe Token: SeIncBasePriorityPrivilege 3000 WMIC.exe Token: SeCreatePagefilePrivilege 3000 WMIC.exe Token: SeBackupPrivilege 3000 WMIC.exe Token: SeRestorePrivilege 3000 WMIC.exe Token: SeShutdownPrivilege 3000 WMIC.exe Token: SeDebugPrivilege 3000 WMIC.exe Token: SeSystemEnvironmentPrivilege 3000 WMIC.exe Token: SeRemoteShutdownPrivilege 3000 WMIC.exe Token: SeUndockPrivilege 3000 WMIC.exe Token: SeManageVolumePrivilege 3000 WMIC.exe Token: 33 3000 WMIC.exe Token: 34 3000 WMIC.exe Token: 35 3000 WMIC.exe Token: 36 3000 WMIC.exe Token: SeIncreaseQuotaPrivilege 3000 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1572 2572 newloader.exe 81 PID 2572 wrote to memory of 1572 2572 newloader.exe 81 PID 1572 wrote to memory of 2876 1572 cmd.exe 82 PID 1572 wrote to memory of 2876 1572 cmd.exe 82 PID 2572 wrote to memory of 1832 2572 newloader.exe 84 PID 2572 wrote to memory of 1832 2572 newloader.exe 84 PID 1832 wrote to memory of 3000 1832 cmd.exe 85 PID 1832 wrote to memory of 3000 1832 cmd.exe 85 PID 2572 wrote to memory of 784 2572 newloader.exe 86 PID 2572 wrote to memory of 784 2572 newloader.exe 86 PID 784 wrote to memory of 2624 784 cmd.exe 87 PID 784 wrote to memory of 2624 784 cmd.exe 87 PID 2572 wrote to memory of 3596 2572 newloader.exe 88 PID 2572 wrote to memory of 3596 2572 newloader.exe 88 PID 3596 wrote to memory of 1316 3596 cmd.exe 89 PID 3596 wrote to memory of 1316 3596 cmd.exe 89 PID 2572 wrote to memory of 4932 2572 newloader.exe 90 PID 2572 wrote to memory of 4932 2572 newloader.exe 90 PID 4932 wrote to memory of 2524 4932 cmd.exe 91 PID 4932 wrote to memory of 2524 4932 cmd.exe 91 PID 2572 wrote to memory of 3816 2572 newloader.exe 92 PID 2572 wrote to memory of 3816 2572 newloader.exe 92 PID 3816 wrote to memory of 1876 3816 cmd.exe 93 PID 3816 wrote to memory of 1876 3816 cmd.exe 93 PID 2572 wrote to memory of 2956 2572 newloader.exe 97 PID 2572 wrote to memory of 2956 2572 newloader.exe 97 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\newloader.exe"C:\Users\Admin\AppData\Local\Temp\newloader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Description2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Description3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET PNPDeviceID2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET PNPDeviceID3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET AdapterCompatibility2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET AdapterCompatibility3⤵PID:2624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET AdapterRAM2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET AdapterRAM3⤵PID:1316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET Name2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name3⤵
- Detects videocard installed
PID:2524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic PATH Win32_VideoController GET VideoProcessor2⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET VideoProcessor3⤵PID:1876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2956
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1932
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004EC1⤵PID:3744