Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 12:01
Behavioral task
behavioral1
Sample
SteamUDP.exe
Resource
win10-20240404-en
General
-
Target
SteamUDP.exe
-
Size
112KB
-
MD5
c98e2b56dcd5a3f3aaa0abb0278755b2
-
SHA1
b5999f967c235e3f7147a5fabdf8429bee5a36ff
-
SHA256
903ad14b353ea5efc0dfb4cb91421a17a245aa0b5e45b9ff6653edd2a881df7a
-
SHA512
0c7a4db2e66e601cf0a23392991ddde9d520cfb07d596323a8469c92bddb000e395d9af929d335cc17443412679b7f40224c298190353a9cf8b46dfda4f27153
-
SSDEEP
1536:vw+jjgnJ2H9XqcnW85SbThuIkKuZ+8uZ3nV5XS65mkrPZ58kzQ+e+e+g:vw+jqJ491UbTh3h7J7M+e+e+g
Malware Config
Extracted
xenorat
37.120.141.155
SteamUDP_FULL3
-
delay
5000
-
install_path
temp
-
port
22914
-
startup_name
SteamUDP
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SteamUDP.exe -
Executes dropped EXE 1 IoCs
pid Process 3908 SteamUDP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1792 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3908 2760 SteamUDP.exe 81 PID 2760 wrote to memory of 3908 2760 SteamUDP.exe 81 PID 2760 wrote to memory of 3908 2760 SteamUDP.exe 81 PID 3908 wrote to memory of 1792 3908 SteamUDP.exe 82 PID 3908 wrote to memory of 1792 3908 SteamUDP.exe 82 PID 3908 wrote to memory of 1792 3908 SteamUDP.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SteamUDP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56EA.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:1792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
112KB
MD5c98e2b56dcd5a3f3aaa0abb0278755b2
SHA1b5999f967c235e3f7147a5fabdf8429bee5a36ff
SHA256903ad14b353ea5efc0dfb4cb91421a17a245aa0b5e45b9ff6653edd2a881df7a
SHA5120c7a4db2e66e601cf0a23392991ddde9d520cfb07d596323a8469c92bddb000e395d9af929d335cc17443412679b7f40224c298190353a9cf8b46dfda4f27153
-
Filesize
1KB
MD53e416c7f65c19033c2c17e7f0bc2bfd8
SHA1edc2d8b19e94e8d29579baf5e01c5fe057425712
SHA256fb1d16435bee9ea3fa3d171f3d01818c1c1dd3ce5e47d9292c7b0089ad6f2773
SHA512debae6c61bcf8e34575d4eec2334c27b0205b5a6b428e9f17ff25a55bea845bb5131c68f0ba7384e781b2b9d2dfd1eb2ce93aef47d4fe2dee34a21c147973524