Analysis
-
max time kernel
299s -
max time network
284s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/03/2024, 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://store.steampowered.com
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
http://store.steampowered.com
Resource
win11-20240221-en
General
-
Target
http://store.steampowered.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546429791453694" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 564 chrome.exe 564 chrome.exe 616 chrome.exe 616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 564 chrome.exe 564 chrome.exe 564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe Token: SeShutdownPrivilege 564 chrome.exe Token: SeCreatePagefilePrivilege 564 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe 564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 564 wrote to memory of 1924 564 chrome.exe 78 PID 564 wrote to memory of 1924 564 chrome.exe 78 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3768 564 chrome.exe 80 PID 564 wrote to memory of 3744 564 chrome.exe 81 PID 564 wrote to memory of 3744 564 chrome.exe 81 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82 PID 564 wrote to memory of 3832 564 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://store.steampowered.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbc9cf9758,0x7ffbc9cf9768,0x7ffbc9cf97782⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:22⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4504 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:82⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3844 --field-trial-handle=1840,i,6447047774158472122,15585099810780814316,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD59a5c5ac9d15ca103e5e814fed714ea68
SHA1769baba3b9cd173df80ee4baa4a95d8e275787f5
SHA2565cb36e3d7dde6169c6b62d341b213fb2d82b8604a1945097d5dc1dd7d77ba737
SHA512389e5327d41a83798699f398954020403fd0aad07cdf2e6959734fba8cd0341bc7fbe4aa67b00480da2938ee23cd449e98278579c052f4712e3cbaf3c8db2c90
-
Filesize
1KB
MD5080e16d87b418789faaa1b9e15456152
SHA164de882cb2fae94f23d35a8e9055cf2ec4cf0a49
SHA25667a2d8539800d61c84412df7cfb7908063c6d1ce0f68d2866e2ba9b966834d10
SHA51222064872562c57a8efb63041946e48dfbe4887f7e0bfe09ad8e5bf7c09a1aebd59e48607cb1c30f4e5c3e19c2838883a229ce6b79925ac79806540a6bb7ee084
-
Filesize
707B
MD5d1def37220386003eba3335899e37281
SHA1fe81c8c387d9bb102cf869bc86ca9a500fcaf10a
SHA2562b19fc31c66716469c3a68ec69e4b352fcc1f454d4dfb052c1ca97c7f0b2dd90
SHA5125b9d719183acfa85f3ec9fbdad581641a6311113359fbc387d87af3c8e5b2c9cca56403e46056c86af5ced3361603ff4765d499db5547ca20235a0e3c7927c4e
-
Filesize
6KB
MD578dc9c290475c9487cf0c7654b61846b
SHA16bad3644a47200954c06f7f58644954a34dc174d
SHA2565d85f21ab2fdbdb2ee7c5d804ca066a7aab60fbdcf81e2d7f7f69aa1da07c403
SHA512bcef9277a7cc6b0fec0f211b4a18c7f44df7ac7b804a10cced7fed33633708c11f4d61c1a12dce85ac084eeeacee361cc4f569bf8eed9200629eef744e68583a
-
Filesize
130KB
MD5194fae4db3932b96ee068e94cab909f6
SHA1ad8788d87ba56456f754e70a88fa7739c11a1df1
SHA25621527189fc03c1ea9a1ff2be836fcb4add5641c79379ffabf7e60efad42eec4b
SHA512e490772f25405a5ec09f50a80e82d60efa89b2b979378f500b39a3dc0423dc33936e949989b84e08c8ee2c5bd735be047dc1a8ed16d3382bbdd1d08bc6d9c8f1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd