Overview
overview
7Static
static
1URLScan
urlscan
1https://store.steamp...
windows7-x64
1https://store.steamp...
windows10-1703-x64
1https://store.steamp...
windows10-2004-x64
1https://store.steamp...
windows11-21h2-x64
1https://store.steamp...
android-10-x64
7https://store.steamp...
android-11-x64
7https://store.steamp...
android-13-x64
https://store.steamp...
android-9-x86
7https://store.steamp...
macos-10.15-amd64
4https://store.steamp...
debian-12-armhf
https://store.steamp...
debian-12-mipsel
https://store.steamp...
debian-9-armhf
https://store.steamp...
debian-9-mips
https://store.steamp...
debian-9-mipsel
https://store.steamp...
ubuntu-18.04-amd64
7https://store.steamp...
ubuntu-20.04-amd64
7Analysis
-
max time kernel
22s -
max time network
37s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 13:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral7
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral8
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
https://store.steampowered.com/app/240/CounterStrike_Source/
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBE467BC-FD87-11EE-955A-6E58476EE47C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4824 iexplore.exe 4824 iexplore.exe 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 4824 wrote to memory of 4956 4824 iexplore.exe IEXPLORE.EXE PID 4824 wrote to memory of 4956 4824 iexplore.exe IEXPLORE.EXE PID 4824 wrote to memory of 4956 4824 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://store.steampowered.com/app/240/CounterStrike_Source/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4824 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619Filesize
471B
MD57d25538d7a97ba8edc79503ed170fd8a
SHA13e4aff6fc1eeeb4591c0a4a5795c979715d77efe
SHA256584bc0c0913e53fc054a352679422db9d8e387d6309cc59906288e6e7a218597
SHA5121c7c3ea4a9a6b995fe2b3fa35468c44f3dd5c8a93132d5612b493ca3389e7be7adce4e7ae64c77ff526edd3aa93e3301dd1ddff81db65466a2166a7c8e8ae0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619Filesize
400B
MD5db55b136e35900510759aa6283018e85
SHA1446234df1aae310b52511f96196a6d9078ec2444
SHA25632c304b3246fbf9523a1329c35d124e303716e2a666d1c9d3a5148a5c08d342f
SHA512a95bf80d81ec96ef5a11fa9e06048986f8c08370ae313cdd4f322a6799aa1a0536c109fea830b3584fb41608437a4c129b8c08888ab22e3943c71f86be6dacac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZQ81V7UB\favicon[1].icoFilesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919