Overview
overview
5Static
static
3SteamSetup.exe
windows10-1703-x64
4$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...gs.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3Steam.exe
windows10-1703-x64
5bin/SteamService.exe
windows10-1703-x64
1uninstall.exe
windows10-1703-x64
4$PLUGINSDI...LL.dll
windows10-1703-x64
3$PLUGINSDI...nk.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3Analysis
-
max time kernel
614s -
max time network
1587s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
10-03-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
SteamSetup.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Steam.exe
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
bin/SteamService.exe
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10-20240214-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240221-en
General
-
Target
uninstall.exe
-
Size
139KB
-
MD5
4f009883567dfa9e908c5ffa25a2fa0a
-
SHA1
5848783144c5a04fd4fff71651e3195444156b03
-
SHA256
d0b0305b42c35716482a6aa08c8257c19aad225e3ffd9ab1f0de411d8b9e592e
-
SHA512
015e03849ccb6f646538ebb5a1f75bd973258564a4d2664f51da11e88316e9a3d2863de131f105daf2173a5c494e6c6bcc621c6952144ed4bf4bd2bbdec5ef6d
-
SSDEEP
3072:cAe+3aJpgWXTBuA/JFONMVRO9qyVK+J5n/79:/B+pgUXJFOSVAqyVK+J5nj9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 1868 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1868 1044 uninstall.exe 72 PID 1044 wrote to memory of 1868 1044 uninstall.exe 72 PID 1044 wrote to memory of 1868 1044 uninstall.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD54f009883567dfa9e908c5ffa25a2fa0a
SHA15848783144c5a04fd4fff71651e3195444156b03
SHA256d0b0305b42c35716482a6aa08c8257c19aad225e3ffd9ab1f0de411d8b9e592e
SHA512015e03849ccb6f646538ebb5a1f75bd973258564a4d2664f51da11e88316e9a3d2863de131f105daf2173a5c494e6c6bcc621c6952144ed4bf4bd2bbdec5ef6d
-
Filesize
5KB
MD50c44f21d4afc81cc99fac7cc35e4503a
SHA13d0d5c684df99a46510c0e2c0020163a9d11c08d
SHA2568dc2be6679497994e3ddc97bc7bc1ce2b3c17ef3528b03ded6696ef198a11d10
SHA5124e4bd35d6aa21cecbfe7a93a2ee7db8ee78ca710a4193dfe240d1067afbe10f61db332c1c85f6cc3ba404d895a959742401b615ef8ff5bd9028254c4a43a0923