Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 11:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcornmmunity.com/gift/activation/feor37565hFhs5de
Resource
win10v2004-20240508-en
General
-
Target
https://steamcornmmunity.com/gift/activation/feor37565hFhs5de
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625795958735338" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe Token: SeShutdownPrivilege 2964 chrome.exe Token: SeCreatePagefilePrivilege 2964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2964 wrote to memory of 492 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 492 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 640 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 1868 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 1868 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe PID 2964 wrote to memory of 4664 2964 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://steamcornmmunity.com/gift/activation/feor37565hFhs5de1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86ae6ab58,0x7ff86ae6ab68,0x7ff86ae6ab782⤵PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:22⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1748 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:12⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4988 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3300 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4948 --field-trial-handle=1920,i,1341044288973573474,9945173754242683272,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5e35330c0fae2221fb993dbc425d5d5cc
SHA1f168dea3c7eedff6e3a14cd6f777be939a6fcfff
SHA256ba4ce2887a688023c4dc0a24687dbb25a9bed8de5652b618583c7be953a0c2c9
SHA512bd32c36a7436bbdc6ad7c1a92e8c76499b128cfc314fb9059206cfac99d2b02d8aa35b90f2b0ba24a01b0aac89cc96aea0725329bf40aeb62811e99941138ae2
-
Filesize
257KB
MD56397dc8c4ae7314be4552c19c76d78d8
SHA16163617cafbb32ed3f5a8c96585d3f5f526f0336
SHA256491fc481738b120a504b6a462779571970c28884814b100b1807bbcbbc1edafc
SHA51270a670eb7741922d856f72b7e028bbacd4ce07065b35d461407f1abc1fb995e6489f844357a7b010f8157e0026d1f31e3cef7957cc1c5d63637aae91cfd888d8
-
Filesize
257KB
MD5c75c1be7134eb0545c0533f9936436d2
SHA168ce466ab36534f6663b0bca09ca5c3711e0d6f3
SHA2566ec71f1ebc0b065a5ed6400e84aa3d0776d8221d0d50d947b2c8b42f09c9b2dd
SHA5125e36661af31fc5c00cb1490451e1ec40be921e2f6a7449edf6fa5282855ee4d623a9386cf2f301c2883dba6ebd783337699b9776bea3718505476dcf068b94b0
-
Filesize
91KB
MD5b40a907009cb9f365e254e51a814b8b5
SHA188d1f100a7c493c905693a8ad16a4551625c56c2
SHA256d08c36bd02615143f25bca642c75a546d7a7656417823665fd6b794f6f94187c
SHA51227b42f3048cda910ac3c8530e25096f2ecf3c1ceec24ff1d4b2ce863e104a7e4afe3450516c7d5a7a8b15a7de9ffe6ca2f2e353a6ed09d47130a34f4fb373bd5
-
Filesize
88KB
MD586ef756035b3d64987aef934900cf703
SHA1a831f9e14fb729a68b3f0bec24d6fa86be8e1399
SHA25616546656d65a7529c815b53dc37796accc0e7597be9e1562a2c1479aedb31140
SHA5124025ee0cd19e5155d0d60dfa992b5fb3b3383c5382f241ca4b0eceacefa0c3d40b2746b55c5ea97e5d395c6bd740f46361bdee42e97f235fe43d0876e75ef33b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e