Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 18:55
Static task
static1
Behavioral task
behavioral1
Sample
Steam Checker V0.1 By Abbadon.exe
Resource
win10v2004-20230220-en
General
-
Target
Steam Checker V0.1 By Abbadon.exe
-
Size
466KB
-
MD5
1191fde33722c3e1aba8711b0983eb98
-
SHA1
8f9a4612b672462aaeb65663cd9b4b8dd16ce345
-
SHA256
25436b650ac4365eac19bbe56d8bfd79045fb437de6f5476254ac96a6d7afb94
-
SHA512
d872b5a8845bd13d90b7c09eb4838d64e3b491b1a92d9a2f91fc7aad696e8cb2cd3ddc4bb07930bdd7be719b001fb39f752f8584c40fac6f6671e9255ec461ad
-
SSDEEP
6144:7t+J2xLKMBCNCc994aCVoYxQOK+GIIIIIIIhIIIIIIIIIIIIIIIU:x+01Bqp99A6b8
Malware Config
Extracted
xworm
considered-arrest.at.ply.gg:19159
-
install_file
USB.exe
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Steam Checker V0.1 By Abbadon.exeWindows Defender.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Steam Checker V0.1 By Abbadon.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Windows Defender.exe -
Drops startup file 2 IoCs
Processes:
Windows Defender.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk Windows Defender.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk Windows Defender.exe -
Executes dropped EXE 5 IoCs
Processes:
Steam Checker V0.1 By Abbadon.exeWindows Defender.exeWindows Defender.exeWindows Defender.exeWindows Defender.exepid process 5060 Steam Checker V0.1 By Abbadon.exe 4160 Windows Defender.exe 1676 Windows Defender.exe 2220 Windows Defender.exe 3428 Windows Defender.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Defender.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender.exe" Windows Defender.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 748 5060 WerFault.exe Steam Checker V0.1 By Abbadon.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Windows Defender.exepid process 4160 Windows Defender.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Windows Defender.exeWindows Defender.exeWindows Defender.exeWindows Defender.exedescription pid process Token: SeDebugPrivilege 4160 Windows Defender.exe Token: SeDebugPrivilege 4160 Windows Defender.exe Token: SeDebugPrivilege 1676 Windows Defender.exe Token: SeDebugPrivilege 2220 Windows Defender.exe Token: SeDebugPrivilege 3428 Windows Defender.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Defender.exepid process 4160 Windows Defender.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Steam Checker V0.1 By Abbadon.exeWindows Defender.exedescription pid process target process PID 3224 wrote to memory of 5060 3224 Steam Checker V0.1 By Abbadon.exe Steam Checker V0.1 By Abbadon.exe PID 3224 wrote to memory of 5060 3224 Steam Checker V0.1 By Abbadon.exe Steam Checker V0.1 By Abbadon.exe PID 3224 wrote to memory of 5060 3224 Steam Checker V0.1 By Abbadon.exe Steam Checker V0.1 By Abbadon.exe PID 3224 wrote to memory of 4160 3224 Steam Checker V0.1 By Abbadon.exe Windows Defender.exe PID 3224 wrote to memory of 4160 3224 Steam Checker V0.1 By Abbadon.exe Windows Defender.exe PID 4160 wrote to memory of 3372 4160 Windows Defender.exe schtasks.exe PID 4160 wrote to memory of 3372 4160 Windows Defender.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Steam Checker V0.1 By Abbadon.exe"C:\Users\Admin\AppData\Local\Temp\Steam Checker V0.1 By Abbadon.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Steam Checker V0.1 By Abbadon.exe"C:\Users\Admin\AppData\Roaming\Steam Checker V0.1 By Abbadon.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 8243⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender" /tr "C:\Users\Admin\AppData\Roaming\Windows Defender.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 50601⤵
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.logFilesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
C:\Users\Admin\AppData\Roaming\Steam Checker V0.1 By Abbadon.exeFilesize
121KB
MD5f0bfac0acff34c1e85a1fa3b63c315a6
SHA152b9ab7aa6b1836ae278da3575c5c7338f2c43b5
SHA2562ddc9622baef1953e848b441d949bea26e22097149a44b04f0fa870e334c549a
SHA512fd4021d4638ffb54afa237b372f92768a105cd1b1fa7a7012ca64e4bfab73c91f826191b9d07aff09bc26f170b1aea673dd9e08be5fb311708177a7ed4a7fdbc
-
C:\Users\Admin\AppData\Roaming\Steam Checker V0.1 By Abbadon.exeFilesize
121KB
MD5f0bfac0acff34c1e85a1fa3b63c315a6
SHA152b9ab7aa6b1836ae278da3575c5c7338f2c43b5
SHA2562ddc9622baef1953e848b441d949bea26e22097149a44b04f0fa870e334c549a
SHA512fd4021d4638ffb54afa237b372f92768a105cd1b1fa7a7012ca64e4bfab73c91f826191b9d07aff09bc26f170b1aea673dd9e08be5fb311708177a7ed4a7fdbc
-
C:\Users\Admin\AppData\Roaming\Steam Checker V0.1 By Abbadon.exeFilesize
121KB
MD5f0bfac0acff34c1e85a1fa3b63c315a6
SHA152b9ab7aa6b1836ae278da3575c5c7338f2c43b5
SHA2562ddc9622baef1953e848b441d949bea26e22097149a44b04f0fa870e334c549a
SHA512fd4021d4638ffb54afa237b372f92768a105cd1b1fa7a7012ca64e4bfab73c91f826191b9d07aff09bc26f170b1aea673dd9e08be5fb311708177a7ed4a7fdbc
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
C:\Users\Admin\AppData\Roaming\Windows Defender.exeFilesize
67KB
MD5404dee8c8fe0b8c25ac39f60960dcbf0
SHA1078b5427a3c29a2f410f0e09f667389ad630ed60
SHA25690d2777179534bb5746559397a767aeee141f30a57b53c5d9c2122278b4bc4b7
SHA5129d7c6c2cceff330acea030002c4c7fde0a9ebe4f6a94a035e6fd6f08d7f5fea407680e5acd5baef687a19f40e116c47e8615dd4f728bdac7636529665e83956e
-
memory/3224-133-0x0000000000FB0000-0x000000000102A000-memory.dmpFilesize
488KB
-
memory/4160-160-0x000000001B650000-0x000000001B660000-memory.dmpFilesize
64KB
-
memory/4160-162-0x000000001B650000-0x000000001B660000-memory.dmpFilesize
64KB
-
memory/4160-157-0x0000000000940000-0x0000000000958000-memory.dmpFilesize
96KB
-
memory/5060-158-0x0000000000560000-0x0000000000584000-memory.dmpFilesize
144KB
-
memory/5060-159-0x00000000053F0000-0x0000000005994000-memory.dmpFilesize
5.6MB