Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2023, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
steam_api.dll
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
steam_api.dll
Resource
win10v2004-20220901-en
6 signatures
150 seconds
General
-
Target
steam_api.dll
-
Size
1.3MB
-
MD5
e869484d80d8d08b1a31639127c3d344
-
SHA1
29208a8734f6c713d2ea7c343ff159d35358e356
-
SHA256
cdc6ac3c1c5e5d54fbfdbb825b7ea5f0a6b0886fc0cee7ff3cc51cef8d064b28
-
SHA512
79e01f60c18c24d2fb366952b28463a48ec0955220e65f99c30870a2c4fd12a95619f4de665a055cedfe5623c8d083f71ec8861e6b6d2570424a9f088bf45891
-
SSDEEP
24576:bKpb+Lpmbz9gAXilDGgP9GX0dc4hxU4BVoXoo1DJXLFT4mknD1pVOGXSCbAle:K+AzYDGsC0/9cDXT4t1iCcle
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4956 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3224 WINWORD.EXE 3224 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE 3224 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4956 4936 rundll32.exe 82 PID 4936 wrote to memory of 4956 4936 rundll32.exe 82 PID 4936 wrote to memory of 4956 4936 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api.dll,#12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4956
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4568
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3224