Overview
overview
7Static
static
1URLScan
urlscan
1https://store.steamp...
windows7-x64
1https://store.steamp...
windows10-1703-x64
1https://store.steamp...
windows10-2004-x64
1https://store.steamp...
windows11-21h2-x64
1https://store.steamp...
android-10-x64
7https://store.steamp...
android-11-x64
7https://store.steamp...
android-13-x64
https://store.steamp...
android-9-x86
7https://store.steamp...
macos-10.15-amd64
4https://store.steamp...
debian-12-armhf
https://store.steamp...
debian-12-mipsel
https://store.steamp...
debian-9-armhf
https://store.steamp...
debian-9-mips
https://store.steamp...
debian-9-mipsel
https://store.steamp...
ubuntu-18.04-amd64
7https://store.steamp...
ubuntu-20.04-amd64
7Analysis
-
max time kernel
30s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 13:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral7
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral8
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
https://store.steampowered.com/app/240/CounterStrike_Source/
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
https://store.steampowered.com/app/240/CounterStrike_Source/
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E7F3BBD5-FD87-11EE-8F38-D636941CBDF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4992 iexplore.exe 4992 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 4992 wrote to memory of 2856 4992 iexplore.exe IEXPLORE.EXE PID 4992 wrote to memory of 2856 4992 iexplore.exe IEXPLORE.EXE PID 4992 wrote to memory of 2856 4992 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://store.steampowered.com/app/240/CounterStrike_Source/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4992 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ea2fecd2ebbd7125b4986b97f9ff0d1c
SHA13e3242e2827d48fae025c28125b0395be0169032
SHA256b2aef5013543bbf709939c9a589070080283b8be971db1a5debf2ae3071e234f
SHA512c0e5907d115338223eff2cfa2674123bd09615b9b98f22c88e0d034917edf0acb26267590b6df7a59acf4a3e5b3fd2c3337f08a2cab9bd89343b52321bf922c1
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919