Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/06/2023, 10:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunity.com/profiles/76561199510444991
Resource
win10-20230220-en
General
-
Target
http://steamcommunity.com/profiles/76561199510444991
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133301770097205208" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 696 chrome.exe 696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe Token: SeShutdownPrivilege 1308 chrome.exe Token: SeCreatePagefilePrivilege 1308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe 1308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1436 1308 chrome.exe 66 PID 1308 wrote to memory of 1436 1308 chrome.exe 66 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 2620 1308 chrome.exe 69 PID 1308 wrote to memory of 4300 1308 chrome.exe 68 PID 1308 wrote to memory of 4300 1308 chrome.exe 68 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70 PID 1308 wrote to memory of 1616 1308 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://steamcommunity.com/profiles/765611995104449911⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe8e699758,0x7ffe8e699768,0x7ffe8e6997782⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:22⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2760 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4356 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2436 --field-trial-handle=1760,i,16679094683113017015,15203727063683365953,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912B
MD54bd79e7000dea514ac0672113a350534
SHA1c5adc2979d3ae20391d65f8e349a2415c02fedda
SHA2560be20a2d5179a5b793446df150ca9469a869f5659c3c2e47f10772576299713a
SHA512005a225f03909f953fa0eb7bdc67b571c0b3a8a7341f8d08eed3fd3d179391e5cde775eb9bb344a69b5c1f729cae0bfa4ac2329ae947b32a5f79b2c69117cb22
-
Filesize
917B
MD503ffd0aae5e86d4c4ba044a2d630514a
SHA1dfdaa22a5529c90dfbe408630c163f91add11cd4
SHA256f2b491576e7cd2e2455ae4062e579ccd9b785bd6ccfcde9693868930ec45f966
SHA512d0ed96a6138bed17535406cb6f07224b18601445e1db99b83e622213a464128f29d7f260feb7d34fa77b072a1a8f4d8aee6a4007aeb3959208c010d7ae5678bf
-
Filesize
538B
MD56be7984c88cf71ea6d2ea1c2736429a0
SHA161bfc14d4effbb6d5321b537eeb550d7c764c1a4
SHA25691a998976cae6028c103ee6f4092ac3032a2c319bd05c425d7bdd4f384165b38
SHA512252f88f4eb78e29dbcad629e4bb4ed7aca5ef988ade9af5fa50cf62623289fef427f0846b91a7ded2e8c7eb3e1f3e556129b14cf9cd3e0ac13e5cac8bcd3b8d9
-
Filesize
5KB
MD5e2889fb1e46fea30ac847c707b3cb921
SHA19caf3869bdaf51720faac5798766819857f12e6d
SHA256f35b068a709a7dfb7f48c7c34a3675fa4c5be64a1054643823e8f26673dfe411
SHA512bfdd3f5a82ecaedaf51ab63a18390f7ba5a389ab529b10c21ccc37a7b52dd1161d9176cfdb521503707a5e863114bf40182753165c19ffdd1ecd8aa0e993a547
-
Filesize
5KB
MD537ad796e0cf9c9f6fda27beb6fec26ed
SHA118600776e08fc8416708db60bb304c1bff4523c5
SHA256220861560db1e3ec9acd87ba5061ea035a092e3d87dac5f6f64e47efa8c00d5d
SHA5126444b89eec158314c038dbe3850ad26591171184d0a91f7dd8433ddf61443ef07f8c20c513427c5f0e5136c65c86d1bca12172a924bab1ab1ba22bab72f7be6a
-
Filesize
5KB
MD50ae07d312a8c171ad6aec4d8d5be6268
SHA1a76d121e0a6c00c99bfdafd5fa9a71f39ecaf769
SHA256af5213bb1a8d8e50fe32df8f8ca520be115e446a65f98e0f0ca6bb3ecb365a3c
SHA51219c9b5e7c75c0abef28a553530e9667ce0f3e329df2a53c03d9f89b3e15f57f8430855b88419d9537dd30653187969034dc5794efb33eb02943775e9ca2a823e
-
Filesize
158KB
MD53c015f482aebfd8b5ec445d682f5e149
SHA15e7a53fff7935845da7d49e5b54c68207c67b9c6
SHA256bf902f7dc60f71e339e209627f2a517d8bc21202a443d4d1378318b604ecd1df
SHA512b814a02397a31fc38d466c258a6af32e64b0e78fa656dcdacc674ae4bbca37f1dc02848afc6008ccb22a3c4c8ab89a0d57e264d449ee27d4e0abca85c102b51d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd