Analysis
-
max time kernel
61s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
11-03-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
steam_api_o.dll
Resource
win10v2004-20230220-es
General
-
Target
steam_api_o.dll
-
Size
142KB
-
MD5
69bee18efe39e0bd24b8ac979b560f39
-
SHA1
a80abfb6d95d59536bb83776258d1094054c3595
-
SHA256
025a1fd2b3e81a1a3d474b1707e3696cbc1a0ff2dee65c4f74b186e688f01ec9
-
SHA512
e363ba05c4eecaec539a9b8f7ba142e3c1a25e95229db6a715f0e0801d0057cace829dfd5c7700043aa86fb6433b9d598e55f486146ea61d0c65be0c0b74d953
-
SSDEEP
3072:GtavZpCLhjiRgMm3Z/vqoj5PKBSLaB/CG1:GAZQjr3BOCG1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133230388401819803" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4708 mspaint.exe 4708 mspaint.exe 2688 mspaint.exe 2688 mspaint.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3348 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4708 mspaint.exe 1688 OpenWith.exe 2688 mspaint.exe 3348 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 368 4448 rundll32.exe 86 PID 4448 wrote to memory of 368 4448 rundll32.exe 86 PID 4448 wrote to memory of 368 4448 rundll32.exe 86 PID 2928 wrote to memory of 1880 2928 chrome.exe 101 PID 2928 wrote to memory of 1880 2928 chrome.exe 101 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4284 2928 chrome.exe 102 PID 2928 wrote to memory of 4556 2928 chrome.exe 103 PID 2928 wrote to memory of 4556 2928 chrome.exe 103 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104 PID 2928 wrote to memory of 2584 2928 chrome.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api_o.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api_o.dll,#12⤵PID:368
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitUnlock.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:1680
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1688
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitUnlock.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2688
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff898ea9758,0x7ff898ea9768,0x7ff898ea97782⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:22⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1788 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD59a39f278e5099bc7c78ae638027ca108
SHA17768515925b3ff0a23be1cc723f35f9b33d9b500
SHA256a9e873c7f41d114eb6876e2ea00ec4efb2d6ead8237683811851a6a1c93be7b4
SHA5121f0057ddd20d9305557db73fa5ba8596ef5fb313a58281290a728a71f10db612d1b39f219f9867fadd3e7c6e42bc500b7b34d4891cd86d6e2d62e636c8d5cb07
-
Filesize
371B
MD5756d8ac2c2f35eb73ca0a7726fac9135
SHA1338edd9dc3f130012c61e65f062dba933efcb50b
SHA256731ca4cb835fb6779d393c42ee8a7f8e63c793b95045136ddb6c351fe785e19a
SHA5126224a1d4c51bc05f72989718eeb73582ecbce05784a3ee6ee1156a86d2e5614e2e49573cbf2a2797e0170c8a07439c17dae6de4e71cb85bf25c06acc2b77b1ad
-
Filesize
6KB
MD55b06505980ac6110e0e0baaf7a159d21
SHA110de3ebef5b60d0742be1d82c834bc7f79e14032
SHA2563ed8b4324ff04c7b3c8ac6eac64da94865942bca251e9ccd36c565e677df48eb
SHA5122f43b056686129570236bd40d895d51a48494c3cf29f7b945948696c32aa1619f1e10d0ed71ec7a1f592ed1f579bab8b816460a4fe988c9b76f09eab1793897e
-
Filesize
15KB
MD56543b569789399685728af805c18c941
SHA12d5eeb2057ec5736d1e856aad50c649cb291b082
SHA256333f065295d916f0cc3c8f31d8c7a8c4c06f3f263c987c44f334b9862c238f71
SHA512d014e967eb54127682984499b5dbeb119bbebbbe8fa63287c7079f8aff6fa02fce36dee26f652b2a2f7c89b56de5809d590abeffe1b64b694906b6d59f2c12a4
-
Filesize
143KB
MD5e778882c1d79d273b7c3babfccb59018
SHA140f01d7d989ad4974b1db404eadd7ca1d1560138
SHA256799b1823f1933e73e89f7661b9b6dd5036c47e527aa9f0df32f1e8204ad52dab
SHA5120a853a3906011f89370d2719c08c7d2cc3883fc6a45071ac33b8ad2f8091682548b1d96acb5ca14140f7c741affe12a01ae21cb6863cf332947ca1d55bfa1f99
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd