Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamgamesfree.io
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
http://steamgamesfree.io
Resource
macos-20240214-en
General
-
Target
http://steamgamesfree.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529250571059996" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2748 1080 chrome.exe 38 PID 1080 wrote to memory of 2748 1080 chrome.exe 38 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 5020 1080 chrome.exe 83 PID 1080 wrote to memory of 2092 1080 chrome.exe 85 PID 1080 wrote to memory of 2092 1080 chrome.exe 85 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84 PID 1080 wrote to memory of 3056 1080 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://steamgamesfree.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd0039758,0x7ffcd0039768,0x7ffcd00397782⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:22⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3644 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4920 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3404 --field-trial-handle=1832,i,4229639863468181008,10156763801552617892,131072 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5e326f6c254cfc524fe766aeb7be57867
SHA1fcd93352729bef1fcc1d6ddc45fdbf6f7fa21bff
SHA2567cc21c50ba816a3834fc5f3af1d10800743e1fabf39889f2e232ff9b652db207
SHA512c43112492ae557496844fcee19ed0dd2482548fa4cc3d3ba6b5b0c98484207c15f82c95a2621640e02a5a812771165e6176a20fbabad40ebfcf88a37c45ec135
-
Filesize
120B
MD5c775fb461cc0ac0281c2112d0cbfcce0
SHA1015113667ded3ae2195db64741cecb08b8f88e39
SHA25653236a6c4492bce7e322c2a0b072eaa23a961519af3bad32eea6e743131f281a
SHA512df568c8e10885af6a6af65e7fc9c27ecbd695827b3dd7dcc89c39af235162d060602e08fa6df3992eaefac34cf7a54a72f452c9b934ff866744794d96bd5e19c
-
Filesize
4KB
MD54644c1b5afc5e34d424ed49fa8e1fc7d
SHA1f2b395af504d518708f7d527753e7de2497f63e6
SHA2562120929334e52e4d60cedb2f3806f34df5fc34a49665b30ff36c196f8d3f54fa
SHA512ca034a274541cc3c51103c86ab25bb3bc4a1120d72f43998fa7bad7bcbe6453db3956a875a3627ed0daaea0282feb5c6d36005aef1fcba5705b51900d077fb39
-
Filesize
1KB
MD572e7adbcc3c9eab042420c8cb2833f4d
SHA1566e5e7ef730d89192004f0ceec8ed478bbe28fe
SHA25638d102115ef928c31bbc77fe75dab3319eae522a49d96f50074b1ff8242a2d8f
SHA5128cfc5c2e6025415e465cd833d5664e8029ce57754a0e3d84d0ba9c3aac5856f668cad9815711b906ec356c2567dfe67511c0aa83694943cae29476b4b5a99b3f
-
Filesize
872B
MD54c3f3473788d95796a49c0f077845e8f
SHA1fc164274fb83ad6e69d1d4f2e93615178771514d
SHA256cfc8b2073811a2c90cda80edb3194f601749cb303506f99dfd59763223c97d1f
SHA512c440431f5f2aed58fdf4a50746974e312159ea59db5fd3b1e5fb4708bc64dc1ddeb5eadedd0622100eb46af945b7a5528c31f059b94f2c818edfe5762472acd8
-
Filesize
6KB
MD53e9d575572805dea1cb69f5ddd7d38ce
SHA1d18aa3709855cfae0e3e2ada413dcd900a9f5583
SHA256337057924dc256a4464b1eaefac415709e057f2dc2d28442c3bd9aa760226208
SHA512e6d4e85b7d9323877d1f9f6ffb9af18240ed3343c0a16fd05ef0921c96f782754a3acb61c93aded79f19f77ffed37b09c259d347dba58fcc30eeab9456f0499c
-
Filesize
6KB
MD5a86e5d7b0fee0573a9ce570b2a3e270b
SHA1144323b7118be2c9fe528052db2fb2178d6cd7b9
SHA256ed6db46fe9a93dfa0e5ae0bb620c080af135435bfad094b40cf0ddd3eb1d5abf
SHA512db1caf1303b99ded8999fef61b49b5c59682c8f20a692ea1b159923bd5367c8861516402c234720e1839cac18c661dc7cedf3a11534e5c6e30e1809aafbc4e85
-
Filesize
129KB
MD53e72ac67575e1292e69c29c70efb174a
SHA156bb5bee158d84fc223d0cedbbfd5ca5bfcbea76
SHA256edf8c90d9671ee65b34edd09ef1d46cde80475cb3ff0e35df068c1b5d37b5a5e
SHA5125c7f00aa91e23a2a3fc7a4ad4bcf6bca3fd8119335153bfda001731875ffab3898ad2a3185736c11f46ef8dfab101e82429b0221ecebcd803bb1e7cea4f9967f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd