Overview
overview
7Static
static
3SteamAchie...25.zip
windows10-2004-x64
1SteamAchie...25.zip
windows11-21h2-x64
1LICENSE.txt
windows10-2004-x64
1LICENSE.txt
windows11-21h2-x64
3SAM.API.dll
windows10-2004-x64
1SAM.API.dll
windows11-21h2-x64
1SAM.Game.exe
windows10-2004-x64
7SAM.Game.exe
windows11-21h2-x64
3SAM.Picker.exe
windows10-2004-x64
6SAM.Picker.exe
windows11-21h2-x64
1git-log.txt
windows10-2004-x64
1git-log.txt
windows11-21h2-x64
3Analysis
-
max time kernel
150s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-05-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
SteamAchievementManager-7.0.25.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
SteamAchievementManager-7.0.25.zip
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
LICENSE.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
LICENSE.txt
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
SAM.API.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
SAM.API.dll
Resource
win11-20240426-en
Behavioral task
behavioral7
Sample
SAM.Game.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
SAM.Game.exe
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
SAM.Picker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
SAM.Picker.exe
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
git-log.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
git-log.txt
Resource
win11-20240419-en
General
-
Target
SAM.Picker.exe
-
Size
48KB
-
MD5
2f414a5e3e0fe635d0b600c6cc4748ec
-
SHA1
1bd4a146053c0e880e8e830836e9f3dbc762a823
-
SHA256
3160d13693ca78a2b2d34308ea592e4c6a9616963cc94ad1319db8880748c02e
-
SHA512
9eafe5c11169cb49d9b40cafc057a0dc2415949740cf50dd628b4eb7031f86d131df0d604f4ad985aa0e87059181fdf6b4e4ea0176e84b8a5a9cc34d78a0abcb
-
SSDEEP
768:rnQUAsgG9p0i8p6h6X0n0PehcwXFwJ+PxFdKvs:zQpn6wSuehc7Mxas
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3572 taskmgr.exe Token: SeSystemProfilePrivilege 3572 taskmgr.exe Token: SeCreateGlobalPrivilege 3572 taskmgr.exe Token: 33 3572 taskmgr.exe Token: SeIncBasePriorityPrivilege 3572 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe 3572 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SAM.Picker.exe"C:\Users\Admin\AppData\Local\Temp\SAM.Picker.exe"1⤵PID:1408
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3572