Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-04-2024 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunity.com/gift/7655685934763976
Resource
win11-20240419-en
General
-
Target
http://steamcommunity.com/gift/7655685934763976
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133587307510357693" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 484 chrome.exe 484 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe Token: SeShutdownPrivilege 484 chrome.exe Token: SeCreatePagefilePrivilege 484 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe 484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 484 wrote to memory of 4932 484 chrome.exe chrome.exe PID 484 wrote to memory of 4932 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 3996 484 chrome.exe chrome.exe PID 484 wrote to memory of 4300 484 chrome.exe chrome.exe PID 484 wrote to memory of 4300 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe PID 484 wrote to memory of 1396 484 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://steamcommunity.com/gift/76556859347639761⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87719cc40,0x7ff87719cc4c,0x7ff87719cc582⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1800 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2124 /prefetch:32⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2160 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3016 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3012,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3052 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4252,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4512 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4756,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4344,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3052 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=212,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4648 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3232,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3276 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4904,i,13197364655484584588,1718750518417602919,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\291aff6d-f916-4271-a587-c6f2a3e54e60.tmpFilesize
9KB
MD5def51009ba79fec4cbb8237184b4c095
SHA1271ab04965b8999710f4ead9d7edfa48ad867c1d
SHA256b8d9833c3cecd30cedec5b6e637239ac28d42002c1606c73a54e9bd4e3a59d8d
SHA51273ae204d0dede6bff29c927f8dec9c61c6c19996855864bd66a2072479b34024d1b7ac176965ecc95de5b8d5a188402d5a44a81c8085b9ccadeac71cd1524247
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsStateFilesize
649B
MD52b470d09a56fe11ec83ed5ad5117a53c
SHA1c58c6b454267001999f7e0e4ca46e000f1a670a5
SHA256d7d929ccd7372650b874e20296bfcf05134502da382e26d1f2890d9331a72fb5
SHA5123cea9db8c3cdaf64cacecbc654c7883f60f3ef54d4399533926dc6cb46f150bc3182fe938d37da0805e9cdfdc5bb60e74545dcc3b91e5e4b17cc1fd8f14023c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD57b0d13fe5e25d8a0b5b279dcc1e7703e
SHA10e1fbced7bd146bce18b84ae335061b3d09889d8
SHA2560b9373e2ab2c852e5501c25e33e99492df0fb7c5b69dd5b92b06ed161c93b264
SHA512158d4490282944747fb3aba6ac1bb2f868d919223d61e5fa1ccb8da06c441806086ab1e7ef23bb6c055f3ec010e8b4170e9892bbbb4b2cc23510a94e0868172e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD577cb98f3c96674946d81646482860e16
SHA1d246528deb68160d10582bc7caa63979f6eeaf32
SHA2563166a921eaa69d27274da5e5a1c960201eea631063e726d24957201ddad9eb61
SHA51240c681beb534375983eeb832c1985c80191c1061e75232aece99def9221d3a9094e0b70dab8b79e999bec9a9c0b1a3c2d1b8fabe912e7fd1df916f8de8071d34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
77KB
MD5e65978c7523ac3bd87780f68a91d5584
SHA13a14475f35a24bcffad45cc4b80f19ef0f17803b
SHA256c953e43798772f826456b9cc539ee3b61175685ca1472acfceba3ff7d1e31ae2
SHA5125fb076f2b750fa75945ff901800d7e795774d57b71dc3e501e19371869addeec8f6020f1bafe6a51ab1bde97e324ae8b9dbee3e8e388315c7bf79d2a6110e3d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
77KB
MD5b11f4475118ca4f8b6b8f85f4f686d57
SHA15c01211dab6a35318ec630f12991d3893f250bf9
SHA2569b06b9fbdacb37d5087713bbc3c2c076c7383e2bd2a9b1ee0c14116df8f5b80c
SHA512830a360d1a83bce6090f00e80638b3098abec965e3d76dbf50f039488de22e0f15b568ddf8c0289611fcbaaf45d6c365a29d67725a4242a908555895b6656eea
-
\??\pipe\crashpad_484_VMSNDEUGGPYMYMVCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e