Overview
overview
6Static
static
1SteamSetup.exe
windows10-2004-x64
6$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Steam.exe
windows10-2004-x64
5bin/SteamService.exe
windows10-2004-x64
1uninstall.exe
windows10-2004-x64
4$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
SteamSetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Steam.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
bin/SteamService.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
General
-
Target
uninstall.exe
-
Size
155KB
-
MD5
32109e2aac377fa07b849f4f4033edc5
-
SHA1
a7b87a221744fb2e36327be0a34c17b7d734c47f
-
SHA256
72ffe8859eaa63637f5a62b7c454241db35938f8326f6ccf20352e00f8df2fe5
-
SHA512
688d9b51060d84c4e2dd0ddbb20d43bbc8bf93a903f26e855f546335bd7a5c9ef5c6f888dff35d379cbb1d782c5e231b33831b7272cde2b40c2d7fc2b85ffc0d
-
SSDEEP
3072:iIAe+3aJpgWXTBuq/JFONM2cZ6iKowuq12ApG3s/6:izB+pgURJFOS21iQ5i+6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4372 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 4372 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4372 4092 uninstall.exe 83 PID 4092 wrote to memory of 4372 4092 uninstall.exe 83 PID 4092 wrote to memory of 4372 4092 uninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD546ba3881f8b27f54a8d92d600e61ee7b
SHA115933b6ece85a6d45fd78ae499b445a3bc6d2d05
SHA2564fca692a36f0c99e26b5bc7ef9db5269d2c1e21288184953898130fea9b1c4fc
SHA5126f64d3cb4634ed51710f578667b92a429aa871a0a141092df3cf7e0134a0b145f802f91126f1ce43ddb4b9d6cc6fb875c9acec22eab0cec86a72dd916e1f9eb3
-
Filesize
155KB
MD532109e2aac377fa07b849f4f4033edc5
SHA1a7b87a221744fb2e36327be0a34c17b7d734c47f
SHA25672ffe8859eaa63637f5a62b7c454241db35938f8326f6ccf20352e00f8df2fe5
SHA512688d9b51060d84c4e2dd0ddbb20d43bbc8bf93a903f26e855f546335bd7a5c9ef5c6f888dff35d379cbb1d782c5e231b33831b7272cde2b40c2d7fc2b85ffc0d