Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:23
Behavioral task
behavioral1
Sample
SteamUDP.exe
Resource
win7-20240419-en
General
-
Target
SteamUDP.exe
-
Size
45KB
-
MD5
71f93439066552063011b27f448fc1ce
-
SHA1
afd983b5d3a34ba29ef18d7675e617b9a6da724f
-
SHA256
5379f50c0b4b3a28641354e048b51278dd10519f50e081a07bbe8f0d4f22a5ad
-
SHA512
ac56596bb93e61d240933353a1d3fd1d5a64dce97e13d381b94190f312ec57be856cd3fdd08c685d6960d734518514b7ecf69284e6371fe8fd96480ae1d76be3
-
SSDEEP
768:9dhO/poiiUcjlJInbzH9Xqk5nWEZ5SbTDa+WI7CPW5w:zw+jjgnXH9XqcnW85SbT/WIY
Malware Config
Extracted
xenorat
37.120.141.155
SteamUDP
-
delay
5000
-
install_path
temp
-
port
22914
-
startup_name
SteamUDPUpdater
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1248 SteamUDP.exe -
Loads dropped DLL 1 IoCs
pid Process 1876 SteamUDP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1876 wrote to memory of 1248 1876 SteamUDP.exe 28 PID 1248 wrote to memory of 2740 1248 SteamUDP.exe 29 PID 1248 wrote to memory of 2740 1248 SteamUDP.exe 29 PID 1248 wrote to memory of 2740 1248 SteamUDP.exe 29 PID 1248 wrote to memory of 2740 1248 SteamUDP.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SteamUDPUpdater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp32F2.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD571f93439066552063011b27f448fc1ce
SHA1afd983b5d3a34ba29ef18d7675e617b9a6da724f
SHA2565379f50c0b4b3a28641354e048b51278dd10519f50e081a07bbe8f0d4f22a5ad
SHA512ac56596bb93e61d240933353a1d3fd1d5a64dce97e13d381b94190f312ec57be856cd3fdd08c685d6960d734518514b7ecf69284e6371fe8fd96480ae1d76be3
-
Filesize
1KB
MD53e416c7f65c19033c2c17e7f0bc2bfd8
SHA1edc2d8b19e94e8d29579baf5e01c5fe057425712
SHA256fb1d16435bee9ea3fa3d171f3d01818c1c1dd3ce5e47d9292c7b0089ad6f2773
SHA512debae6c61bcf8e34575d4eec2334c27b0205b5a6b428e9f17ff25a55bea845bb5131c68f0ba7384e781b2b9d2dfd1eb2ce93aef47d4fe2dee34a21c147973524