Analysis

  • max time kernel
    61s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    11-03-2023 19:06

General

  • Target

    steam_api_o.dll

  • Size

    142KB

  • MD5

    69bee18efe39e0bd24b8ac979b560f39

  • SHA1

    a80abfb6d95d59536bb83776258d1094054c3595

  • SHA256

    025a1fd2b3e81a1a3d474b1707e3696cbc1a0ff2dee65c4f74b186e688f01ec9

  • SHA512

    e363ba05c4eecaec539a9b8f7ba142e3c1a25e95229db6a715f0e0801d0057cace829dfd5c7700043aa86fb6433b9d598e55f486146ea61d0c65be0c0b74d953

  • SSDEEP

    3072:GtavZpCLhjiRgMm3Z/vqoj5PKBSLaB/CG1:GAZQjr3BOCG1

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api_o.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\steam_api_o.dll,#1
      2⤵
        PID:368
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitUnlock.jfif" /ForceBootstrapPaint3D
      1⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4708
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
      1⤵
      • Drops file in System32 directory
      PID:1680
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1688
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExitUnlock.jfif" /ForceBootstrapPaint3D
      1⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2688
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3348
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff898ea9758,0x7ff898ea9768,0x7ff898ea9778
        2⤵
          PID:1880
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:2
          2⤵
            PID:4284
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:8
            2⤵
              PID:4556
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1788 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:8
              2⤵
                PID:2584
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:1
                2⤵
                  PID:3024
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:1
                  2⤵
                    PID:3180
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:1
                    2⤵
                      PID:1996
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:8
                      2⤵
                        PID:1440
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:8
                        2⤵
                          PID:4968
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1452,i,1447852433116584014,1461313557714844778,131072 /prefetch:8
                          2⤵
                            PID:824
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:4824

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            9a39f278e5099bc7c78ae638027ca108

                            SHA1

                            7768515925b3ff0a23be1cc723f35f9b33d9b500

                            SHA256

                            a9e873c7f41d114eb6876e2ea00ec4efb2d6ead8237683811851a6a1c93be7b4

                            SHA512

                            1f0057ddd20d9305557db73fa5ba8596ef5fb313a58281290a728a71f10db612d1b39f219f9867fadd3e7c6e42bc500b7b34d4891cd86d6e2d62e636c8d5cb07

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            371B

                            MD5

                            756d8ac2c2f35eb73ca0a7726fac9135

                            SHA1

                            338edd9dc3f130012c61e65f062dba933efcb50b

                            SHA256

                            731ca4cb835fb6779d393c42ee8a7f8e63c793b95045136ddb6c351fe785e19a

                            SHA512

                            6224a1d4c51bc05f72989718eeb73582ecbce05784a3ee6ee1156a86d2e5614e2e49573cbf2a2797e0170c8a07439c17dae6de4e71cb85bf25c06acc2b77b1ad

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            5b06505980ac6110e0e0baaf7a159d21

                            SHA1

                            10de3ebef5b60d0742be1d82c834bc7f79e14032

                            SHA256

                            3ed8b4324ff04c7b3c8ac6eac64da94865942bca251e9ccd36c565e677df48eb

                            SHA512

                            2f43b056686129570236bd40d895d51a48494c3cf29f7b945948696c32aa1619f1e10d0ed71ec7a1f592ed1f579bab8b816460a4fe988c9b76f09eab1793897e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                            Filesize

                            15KB

                            MD5

                            6543b569789399685728af805c18c941

                            SHA1

                            2d5eeb2057ec5736d1e856aad50c649cb291b082

                            SHA256

                            333f065295d916f0cc3c8f31d8c7a8c4c06f3f263c987c44f334b9862c238f71

                            SHA512

                            d014e967eb54127682984499b5dbeb119bbebbbe8fa63287c7079f8aff6fa02fce36dee26f652b2a2f7c89b56de5809d590abeffe1b64b694906b6d59f2c12a4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            143KB

                            MD5

                            e778882c1d79d273b7c3babfccb59018

                            SHA1

                            40f01d7d989ad4974b1db404eadd7ca1d1560138

                            SHA256

                            799b1823f1933e73e89f7661b9b6dd5036c47e527aa9f0df32f1e8204ad52dab

                            SHA512

                            0a853a3906011f89370d2719c08c7d2cc3883fc6a45071ac33b8ad2f8091682548b1d96acb5ca14140f7c741affe12a01ae21cb6863cf332947ca1d55bfa1f99

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • memory/1680-148-0x000001A2691D0000-0x000001A2691D1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-152-0x000001A269270000-0x000001A269271000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-151-0x000001A269270000-0x000001A269271000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-150-0x000001A269260000-0x000001A269261000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-149-0x000001A269260000-0x000001A269261000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-133-0x000001A2605C0000-0x000001A2605D0000-memory.dmp

                            Filesize

                            64KB

                          • memory/1680-146-0x000001A2691D0000-0x000001A2691D1000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-144-0x000001A269150000-0x000001A269151000-memory.dmp

                            Filesize

                            4KB

                          • memory/1680-137-0x000001A260E60000-0x000001A260E70000-memory.dmp

                            Filesize

                            64KB