Analysis
-
max time kernel
42s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe
Resource
win10v2004-20230915-en
General
-
Target
83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe
-
Size
3.4MB
-
MD5
9af9bdbf4122961480380fa09710b7b4
-
SHA1
d81c044d2369d9315e6fa9771a905e06db50893c
-
SHA256
83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa
-
SHA512
181f70f967843d916ec5a91ee6bd5cebab167041ea023d6ec243a7a465a90f0d7895568417bfb2679ee21d4711e0db82b0c6d6371567f54603f3aae11b55f990
-
SSDEEP
98304:fGdfOmZ+aJfY3WHR/itTWYqKp/eefDQ2xkNFCbT4dvu:oOluftH9Rkp/eefk5obT4E
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2060 sxteam.exe 1996 CliSvc 应用程序.exe 1792 Steam.exe -
Loads dropped DLL 6 IoCs
pid Process 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 2060 sxteam.exe 2060 sxteam.exe 2060 sxteam.exe 2060 sxteam.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sxteam.exe 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2060 sxteam.exe 2060 sxteam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2060 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 28 PID 1260 wrote to memory of 2060 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 28 PID 1260 wrote to memory of 2060 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 28 PID 1260 wrote to memory of 2060 1260 83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe 28 PID 2060 wrote to memory of 1996 2060 sxteam.exe 31 PID 2060 wrote to memory of 1996 2060 sxteam.exe 31 PID 2060 wrote to memory of 1996 2060 sxteam.exe 31 PID 2060 wrote to memory of 1996 2060 sxteam.exe 31 PID 2060 wrote to memory of 1792 2060 sxteam.exe 32 PID 2060 wrote to memory of 1792 2060 sxteam.exe 32 PID 2060 wrote to memory of 1792 2060 sxteam.exe 32 PID 2060 wrote to memory of 1792 2060 sxteam.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe"C:\Users\Admin\AppData\Local\Temp\83afc6aaa1a9277bd633878524b9724b9fd53392d7b66a17684b4a942686bcaa.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\sxteam.exeC:\Windows\System32\sxteam.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\CliSvc 应用程序.exe"C:\Users\Admin\AppData\Local\Temp\CliSvc 应用程序.exe"3⤵
- Executes dropped EXE
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Steam.exe"C:\Users\Admin\AppData\Local\Temp\Steam.exe"3⤵
- Executes dropped EXE
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d7ceab81811a07e4760ed8c752950448
SHA16b29051c9a1b0735a89784161eecefd34e861f18
SHA25637abf6214bfdc5354ed985b246e774b5b95a4afb073db7cc4140cfd84127ca54
SHA512cdb64bcf412eac858c90c6a834064d4ed5b269b14d52a2562168ed9761b314e831ca4005b386ead0ccc6bc8a7f5f0806ec9defa1170f9b6e256aeb931c4b9510
-
Filesize
1.1MB
MD5d7ceab81811a07e4760ed8c752950448
SHA16b29051c9a1b0735a89784161eecefd34e861f18
SHA25637abf6214bfdc5354ed985b246e774b5b95a4afb073db7cc4140cfd84127ca54
SHA512cdb64bcf412eac858c90c6a834064d4ed5b269b14d52a2562168ed9761b314e831ca4005b386ead0ccc6bc8a7f5f0806ec9defa1170f9b6e256aeb931c4b9510
-
Filesize
1.1MB
MD56cc3132f1ab90f8898776f4e545dbb13
SHA1a5821415544e2b131061ede56b5142ef92cea2be
SHA25611c907ecf283c2f36823356335295ac878d8ee26a8c2b3ec933fc51549ac0042
SHA512ef0f29948def76e81aaaa2f8a0877b3acce3e86132ccc1482fc6d2c7006a66e37c97d73d21441a8300c07d31cf9a9d0b1032b41dc9f6b6cd00d8a812f6feb301
-
Filesize
1.1MB
MD56cc3132f1ab90f8898776f4e545dbb13
SHA1a5821415544e2b131061ede56b5142ef92cea2be
SHA25611c907ecf283c2f36823356335295ac878d8ee26a8c2b3ec933fc51549ac0042
SHA512ef0f29948def76e81aaaa2f8a0877b3acce3e86132ccc1482fc6d2c7006a66e37c97d73d21441a8300c07d31cf9a9d0b1032b41dc9f6b6cd00d8a812f6feb301
-
Filesize
2.7MB
MD5759f87a899ae0d3d42959b594e0ea13d
SHA1ae7e1865b67b3e472fc5763a763b59dbf7e2c997
SHA2565eb5107ec1d4ef94887d00b6bf3f8109035bd55dd81f99650b41efe6754ea0c6
SHA512814e077ee8e0f1d764d97ca56e5fa6c9c796601257a383c6867452c6c132fb9caa90277f278c304a5a623a7aee3ccbddc194e9cf85390096cce5d9a5af9dd4c7
-
Filesize
2.7MB
MD5759f87a899ae0d3d42959b594e0ea13d
SHA1ae7e1865b67b3e472fc5763a763b59dbf7e2c997
SHA2565eb5107ec1d4ef94887d00b6bf3f8109035bd55dd81f99650b41efe6754ea0c6
SHA512814e077ee8e0f1d764d97ca56e5fa6c9c796601257a383c6867452c6c132fb9caa90277f278c304a5a623a7aee3ccbddc194e9cf85390096cce5d9a5af9dd4c7
-
Filesize
2.7MB
MD5759f87a899ae0d3d42959b594e0ea13d
SHA1ae7e1865b67b3e472fc5763a763b59dbf7e2c997
SHA2565eb5107ec1d4ef94887d00b6bf3f8109035bd55dd81f99650b41efe6754ea0c6
SHA512814e077ee8e0f1d764d97ca56e5fa6c9c796601257a383c6867452c6c132fb9caa90277f278c304a5a623a7aee3ccbddc194e9cf85390096cce5d9a5af9dd4c7
-
Filesize
1.1MB
MD5d7ceab81811a07e4760ed8c752950448
SHA16b29051c9a1b0735a89784161eecefd34e861f18
SHA25637abf6214bfdc5354ed985b246e774b5b95a4afb073db7cc4140cfd84127ca54
SHA512cdb64bcf412eac858c90c6a834064d4ed5b269b14d52a2562168ed9761b314e831ca4005b386ead0ccc6bc8a7f5f0806ec9defa1170f9b6e256aeb931c4b9510
-
Filesize
1.1MB
MD5d7ceab81811a07e4760ed8c752950448
SHA16b29051c9a1b0735a89784161eecefd34e861f18
SHA25637abf6214bfdc5354ed985b246e774b5b95a4afb073db7cc4140cfd84127ca54
SHA512cdb64bcf412eac858c90c6a834064d4ed5b269b14d52a2562168ed9761b314e831ca4005b386ead0ccc6bc8a7f5f0806ec9defa1170f9b6e256aeb931c4b9510
-
Filesize
1.1MB
MD56cc3132f1ab90f8898776f4e545dbb13
SHA1a5821415544e2b131061ede56b5142ef92cea2be
SHA25611c907ecf283c2f36823356335295ac878d8ee26a8c2b3ec933fc51549ac0042
SHA512ef0f29948def76e81aaaa2f8a0877b3acce3e86132ccc1482fc6d2c7006a66e37c97d73d21441a8300c07d31cf9a9d0b1032b41dc9f6b6cd00d8a812f6feb301
-
Filesize
1.1MB
MD56cc3132f1ab90f8898776f4e545dbb13
SHA1a5821415544e2b131061ede56b5142ef92cea2be
SHA25611c907ecf283c2f36823356335295ac878d8ee26a8c2b3ec933fc51549ac0042
SHA512ef0f29948def76e81aaaa2f8a0877b3acce3e86132ccc1482fc6d2c7006a66e37c97d73d21441a8300c07d31cf9a9d0b1032b41dc9f6b6cd00d8a812f6feb301
-
Filesize
2.7MB
MD5759f87a899ae0d3d42959b594e0ea13d
SHA1ae7e1865b67b3e472fc5763a763b59dbf7e2c997
SHA2565eb5107ec1d4ef94887d00b6bf3f8109035bd55dd81f99650b41efe6754ea0c6
SHA512814e077ee8e0f1d764d97ca56e5fa6c9c796601257a383c6867452c6c132fb9caa90277f278c304a5a623a7aee3ccbddc194e9cf85390096cce5d9a5af9dd4c7
-
Filesize
2.7MB
MD5759f87a899ae0d3d42959b594e0ea13d
SHA1ae7e1865b67b3e472fc5763a763b59dbf7e2c997
SHA2565eb5107ec1d4ef94887d00b6bf3f8109035bd55dd81f99650b41efe6754ea0c6
SHA512814e077ee8e0f1d764d97ca56e5fa6c9c796601257a383c6867452c6c132fb9caa90277f278c304a5a623a7aee3ccbddc194e9cf85390096cce5d9a5af9dd4c7