Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10-10-2023 11:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steer.us/
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
https://steer.us/
Resource
win10v2004-20230915-en
General
-
Target
https://steer.us/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133414103175715179" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 420 chrome.exe 420 chrome.exe 1364 chrome.exe 1364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe Token: SeShutdownPrivilege 420 chrome.exe Token: SeCreatePagefilePrivilege 420 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe 420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 420 wrote to memory of 2088 420 chrome.exe 69 PID 420 wrote to memory of 2088 420 chrome.exe 69 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4824 420 chrome.exe 71 PID 420 wrote to memory of 4284 420 chrome.exe 72 PID 420 wrote to memory of 4284 420 chrome.exe 72 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75 PID 420 wrote to memory of 4264 420 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://steer.us/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcd8f89758,0x7ffcd8f89768,0x7ffcd8f897782⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:22⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2820 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:12⤵PID:200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2812 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4832 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4664 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 --field-trial-handle=1812,i,3135943834488642520,4488754063641706861,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5b2b3fa2a61e8063c005d2c135748d1fc
SHA1868a9742a0888e15ecfcf85600efe9ad1ebed89d
SHA2568435a80d53dce2db3b863a9783cc07a10935b1cbb42a5e0a6c62a2b400f4a599
SHA512d164149420a132b49a1b694d3ebfdb9ea32d4f487b3e3561dbfdf7fecee08c4dc64b5c2db2d58a2f10b2941c607b032cb79be533f3a298c16579b523daa93d09
-
Filesize
3KB
MD5399c56e1d496e8adb4e80084df2467fc
SHA17509ee8bd4326c53cf44a452b0e15b11b91bada7
SHA256e5b76dc6922f3e9cc29b0a12c8ee26fc0fcf6c3902bd337c442ab71b9bf7e26f
SHA5123804f51d6ba244a2fce9c4817cce83e02331d0afcd38429e97dda865111edc6cef3d9840f28ca39db7fcca21f3d38a92d80117d0067b3a5c5119cedd1bdf4c35
-
Filesize
1KB
MD59ac097bbbfb6ee128b94d9fe70347f83
SHA17eb94b7d0088baa9e6acd0a08a8a02c403018987
SHA2565b0441fabd8efecb077d644320305b6f228e00d0c3d524e2e424da870ab6f9fb
SHA5123a8c913f9b2c18f69d575078b8e55565139a71b4e40030090c9bfab9fb4803d4f79b73a80a8dc4360302ab74e797c22908b50cccc2659e0d81d619371b795d07
-
Filesize
5KB
MD5888775a23da5363823bd5f95d947ffa7
SHA14f57929e2232b7b81dc9035c00fbbdad6ee82f98
SHA2569c5a309efcb919324cb9fcb62b1cb4f3d1dd177b204152bc913891d98f7926a9
SHA512cd11e2f2a438b8cc2e8e56dfea17d2ee4d689f0a52cfc353b2a0a545abf73e3e6651d5c45da24528b849df4f9fb8fa7cebc39b531e2a2c1ea38b68ac4ce71718
-
Filesize
6KB
MD5f0c0431a966c095be995995ac92738d4
SHA1bbd5ce85f00bfde0abf24883a26d5977a4a861b1
SHA25644adb353c9541e4d277481b9da1af59b6743600c63c0d3c4e16489e1945dae4c
SHA512cef7ebb972dab13f5f6810c6205e1150cb3fe6584ce5c5483c73e072f9630754b9dcd7005652635baba9641b4405a389fdb17a8736721e14c98bb6fe89e08ffa
-
Filesize
5KB
MD5887f951ca6fe624c71a627c3d33d1a8b
SHA108e52ef5e358482638d1bae7082c2c685eeba6e2
SHA25635004be50e08c422ffa8ffe7c6d942727e632fa92fbfadc78bfdb68dbdbd96e6
SHA51238fcf27e33d060f9a4d71bd32369bb1208c451bf82961820353a8e2f0fd8e3df0059b2cf95c232e534e76a84c6eefa3c008dd6d3642d914a63acaff00b537097
-
Filesize
101KB
MD53f7db681a6f793d4c4e92e86e5521990
SHA11c324071ecc59b0e1283bbac222476be0383e932
SHA256903a4b7d312d9260e358166190611ea7cce53985119492a982da6c334712138f
SHA51255e5ae3159e22c10a92e82808c690b16d4981586c64a190c2be65d88f3308f4d6fcfc58767b34d8451798edc927a30ce38d7adf08b593f95e702f07317f5c30d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd