Analysis
-
max time kernel
29s -
max time network
28s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/05/2024, 08:16
Behavioral task
behavioral1
Sample
Steam.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Steam.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Steam.exe
Resource
win11-20240426-en
General
-
Target
Steam.exe
-
Size
438KB
-
MD5
4b784bf857356251bccf184911e0e8d8
-
SHA1
5ef9015b62a62f4b2bff9a34fb5f3d1639a29937
-
SHA256
3c786fd8f95d6787bf27728c6aa5d58054c6e923445147229f95de18ac4bbacd
-
SHA512
73d2b89b3f9b83c18cc3fd270ef26a288625fc339acc29b0e806b57c185313bb7bfc084cddd8cb95449034bef8ac60481c6b150469eaf4ae2c09a1e9efa5f2da
-
SSDEEP
6144:YfjoMm6fbwY/D8TWrbTP/8+GIIIIIIIhIIIIIIIIIIIIIIIU:sfLheWzPX
Malware Config
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral3/memory/4608-1-0x0000000000480000-0x00000000004F4000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3788 powershell.exe 2504 powershell.exe 1876 powershell.exe 4192 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\ProgramData\\Steam.exe" Steam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3788 powershell.exe 3788 powershell.exe 2504 powershell.exe 2504 powershell.exe 1876 powershell.exe 1876 powershell.exe 4192 powershell.exe 4192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4608 Steam.exe Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 2504 powershell.exe Token: SeDebugPrivilege 1876 powershell.exe Token: SeDebugPrivilege 4192 powershell.exe Token: SeDebugPrivilege 4608 Steam.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3788 4608 Steam.exe 78 PID 4608 wrote to memory of 3788 4608 Steam.exe 78 PID 4608 wrote to memory of 2504 4608 Steam.exe 80 PID 4608 wrote to memory of 2504 4608 Steam.exe 80 PID 4608 wrote to memory of 1876 4608 Steam.exe 82 PID 4608 wrote to memory of 1876 4608 Steam.exe 82 PID 4608 wrote to memory of 4192 4608 Steam.exe 84 PID 4608 wrote to memory of 4192 4608 Steam.exe 84 PID 4608 wrote to memory of 2224 4608 Steam.exe 86 PID 4608 wrote to memory of 2224 4608 Steam.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Steam.exe"C:\Users\Admin\AppData\Local\Temp\Steam.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Steam.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Steam.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Steam.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Steam.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Steam" /tr "C:\ProgramData\Steam.exe"2⤵
- Creates scheduled task(s)
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55ba388a6597d5e09191c2c88d2fdf598
SHA113516f8ec5a99298f6952438055c39330feae5d8
SHA256e6b6223094e8fc598ad12b3849e49f03a141ccd21e0eaa336f81791ad8443eca
SHA512ead2a2b5a1c2fad70c1cf570b2c9bfcb7364dd9f257a834eb819e55b8fee78e3f191f93044f07d51c259ca77a90ee8530f9204cbae080fba1d5705e1209f5b19
-
Filesize
944B
MD5979db644c2cade95abc261f491bf3b6c
SHA1251e5cde0a34f14694f95c681dc7cfe63bd60844
SHA2563781dd13cdbb9b2639aafb7e49da7e37ef6e3bb03151240764819a46b7a13cb9
SHA5127114c56e51c5212d951093d72c98ef7a31055693b1de7b1709347c4af27ed5eadf758e1b0d0faafdbf54252da2ddba571118d9f11dd9bf480bd7fe17e71c5464
-
Filesize
944B
MD5a444c5ef1707a0d5eb7a35c362ef108b
SHA132feb550fbaf87284ab64f0d0de3ceb149e38e73
SHA256d740fc7dd506ff7662f70c50f911542cd5706d340c7c48713fc435066a96c0b1
SHA512099ca139ae73c1b6cadc9b05d5dc48d39a6380eabf0a9521cd32e20ab637cc58995e47f60c20c7542ac38a43a3dbf6d75579ecb1eabfcad64cdb1d0efa79020f
-
Filesize
944B
MD54093e5ab3812960039eba1a814c2ffb0
SHA1b5e4a98a80be72fccd3cc910e93113d2febef298
SHA256c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c
SHA512f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82