Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 15:30

General

  • Target

    Stream To Earn.exe

  • Size

    164.7MB

  • MD5

    02a1be213c06a662c54ea441388b3891

  • SHA1

    a9bd2b58cc7822aebafa746379fc4a2eb687c1c8

  • SHA256

    5c7d8ff2370ac60e65796117a9e2263aea349fbfe693e5c587eae608b0840b9e

  • SHA512

    db6ec6317e7b81844da912714012de884e4bf6b9e1a15be693c15d41576b44d55e41ca050beec50b65de779eaf26ad30c21745b00aceb3c31c6a3bfdbae1ab08

  • SSDEEP

    1572864:KAfwZnjiR0DcbzG48HkauVmMRX8nypwK7aH+NEObIz3FLDVzWYrSrKYMXN7UltA6:ksUlM+VOAFG

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
    "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "$uninstallString = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\streamToEarn').UninstallString; if ($uninstallString) { Start-Process -FilePath cmd.exe -ArgumentList '/c', $uninstallString -Wait -WindowStyle Hidden } else { Write-Error 'Uninstall string not found' }""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "$uninstallString = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\streamToEarn').UninstallString; if ($uninstallString) { Start-Process -FilePath cmd.exe -ArgumentList '/c', $uninstallString -Wait -WindowStyle Hidden } else { Write-Error 'Uninstall string not found' }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3468
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "$uninstallString = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\streamToEarn').UninstallString; if ($uninstallString) { Start-Process -FilePath cmd.exe -ArgumentList '/c', $uninstallString -Wait -WindowStyle Hidden } else { Write-Error 'Uninstall string not found' }""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "$uninstallString = (Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall\streamToEarn').UninstallString; if ($uninstallString) { Start-Process -FilePath cmd.exe -ArgumentList '/c', $uninstallString -Wait -WindowStyle Hidden } else { Write-Error 'Uninstall string not found' }"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
    • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
      "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Stream To Earn" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1808 --field-trial-handle=1816,i,9320113766038268000,6221074841533180861,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:3756
      • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
        "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Stream To Earn" --mojo-platform-channel-handle=1972 --field-trial-handle=1816,i,9320113766038268000,6221074841533180861,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:3724
        • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
          "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Stream To Earn" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3112 --field-trial-handle=1816,i,9320113766038268000,6221074841533180861,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:1756
        • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
          "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Stream To Earn" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1012 --field-trial-handle=1816,i,9320113766038268000,6221074841533180861,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
          2⤵
          • Checks computer location settings
          PID:3304
        • C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe
          "C:\Users\Admin\AppData\Local\Temp\Stream To Earn.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Stream To Earn" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3548 --field-trial-handle=1816,i,9320113766038268000,6221074841533180861,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          PID:4048

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        6a210b55aded73b2248fc6befecf97ac

        SHA1

        116740a92b20a51523d34f58ee4073557f15a2fa

        SHA256

        50b88de1425817b6d8b443056b45039c874f31624deef02fd74f91668dde808f

        SHA512

        f5b6746e98242c40cd9252143e1050c06cebf891d7cf76772da9c49002607afdd979b9f26399698cc46b706e7f2891a4f228a6459bea9ed09610bbde4a73620c

      • C:\Users\Admin\AppData\Local\Temp\5402f984-2de1-4081-9a94-3352cc8e7a1b.tmp.node

        Filesize

        148KB

        MD5

        4dc971c52b14a3843564fb0ce8a6a0c1

        SHA1

        5b19af49368e4f067cbc73af7b2b54bf2dc8efee

        SHA256

        27ec96008c48052d5f493683297c26b9136f1d6a9e73c3722e243bc959d7cc93

        SHA512

        52510b4c20146e635656814e7088464399cd4ca2d64ca67ee2b116ab4631918e092d90462fc450d610154b3284579cb8b7d0ca7bbc3a6eae6b0a348ccffd04dc

      • C:\Users\Admin\AppData\Local\Temp\9ea43fb5-533e-4245-844c-6ce52a4ba5ea.tmp.node

        Filesize

        147KB

        MD5

        5cb6b3762df753d84e4ffd4afe1a7e1c

        SHA1

        ae2b1c4652aec7315607fc413a4c258f11b69544

        SHA256

        48b7275f47cd44a05d349eb4fdb6cfc451ccbf609a4a56fa34452bcf231c1208

        SHA512

        5723c10ea9c26524f7866b9c749d9887b10c1514bf0cc893ba2a6e9c5d9690015cbcbe024653956af3fb842de3290b4c6c4beb051b67480bdae543d8fd3981cc

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0yocwti0.oiu.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\1a63cddf-1456-41de-a87c-19b05128f4d6.tmp

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\Code Cache\js\index-dir\the-real-index

        Filesize

        48B

        MD5

        71249d3cd134a57883e0215b7716e581

        SHA1

        19ae56d37b71ccf45d3b89165f9edfb9d2baa133

        SHA256

        3ad2b76ab32411882e1cc6ce33b48bab1d13ba75f74beed2d733c229a428db1f

        SHA512

        fddf37010e11070898156eb498d96f961520d8d5cd4597e4b509cfe9f75650b2dc07315d2f08ee546a732350cce30d4c3ed6c434546ab8ab22808e3d9e69abb7

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\Code Cache\js\index-dir\the-real-index

        Filesize

        144B

        MD5

        72a1ee3799a1754e77193dcb59711343

        SHA1

        09e2fdc1e170fa8a0c59a11c358971bc55335201

        SHA256

        1d448a7e80070915bd10c39cde947e3a6eb4d7bf7aef3a4f8dd15c02f382e6ad

        SHA512

        4b45f933f9d71d84c7bafdda6cd69077695a9119ad8ab7c03599421ca15f9eb4a74b2b518c6f6cd6f905a0e6dcad93c8023ceec045bc87e13b4570a056061852

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\Network\Network Persistent State

        Filesize

        1KB

        MD5

        0e8047791787e9c7997d837b4b1355d9

        SHA1

        747d2655156c936b6b25f07f4d053e3df1a77273

        SHA256

        e0803da2062ff9a96fe8cb00812cf3fd26f79f41b865a13c88b6492dcda6d5c1

        SHA512

        0eb7302fb8a01d7bb554c1ad87589a0297ff7ceefa870abce702bd75c39f1e9a3164afe660c454914709dfa0834845226589d6e716cce4fee5925e799169a2d3

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\Network\Network Persistent State~RFe588a1a.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\Stream To Earn\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • memory/3304-113-0x00007FFF9A970000-0x00007FFF9A971000-memory.dmp

        Filesize

        4KB

      • memory/3304-112-0x00007FFF99C20000-0x00007FFF99C21000-memory.dmp

        Filesize

        4KB

      • memory/3304-136-0x0000022F9D030000-0x0000022F9D0DC000-memory.dmp

        Filesize

        688KB

      • memory/3468-38-0x00000247EAF60000-0x00000247EAF82000-memory.dmp

        Filesize

        136KB

      • memory/4048-165-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-167-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-166-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-177-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-176-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-174-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-173-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-172-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-171-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB

      • memory/4048-175-0x0000019552250000-0x0000019552251000-memory.dmp

        Filesize

        4KB