Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 17:23
Behavioral task
behavioral1
Sample
SteamUDP.exe
Resource
win7-20240419-en
General
-
Target
SteamUDP.exe
-
Size
45KB
-
MD5
71f93439066552063011b27f448fc1ce
-
SHA1
afd983b5d3a34ba29ef18d7675e617b9a6da724f
-
SHA256
5379f50c0b4b3a28641354e048b51278dd10519f50e081a07bbe8f0d4f22a5ad
-
SHA512
ac56596bb93e61d240933353a1d3fd1d5a64dce97e13d381b94190f312ec57be856cd3fdd08c685d6960d734518514b7ecf69284e6371fe8fd96480ae1d76be3
-
SSDEEP
768:9dhO/poiiUcjlJInbzH9Xqk5nWEZ5SbTDa+WI7CPW5w:zw+jjgnXH9XqcnW85SbT/WIY
Malware Config
Extracted
xenorat
37.120.141.155
SteamUDP
-
delay
5000
-
install_path
temp
-
port
22914
-
startup_name
SteamUDPUpdater
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SteamUDP.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 SteamUDP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 380 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5036 wrote to memory of 2396 5036 SteamUDP.exe 81 PID 5036 wrote to memory of 2396 5036 SteamUDP.exe 81 PID 5036 wrote to memory of 2396 5036 SteamUDP.exe 81 PID 2396 wrote to memory of 380 2396 SteamUDP.exe 82 PID 2396 wrote to memory of 380 2396 SteamUDP.exe 82 PID 2396 wrote to memory of 380 2396 SteamUDP.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\SteamUDP.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\SteamUDP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "SteamUDPUpdater" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5B6E.tmp" /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:380
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD571f93439066552063011b27f448fc1ce
SHA1afd983b5d3a34ba29ef18d7675e617b9a6da724f
SHA2565379f50c0b4b3a28641354e048b51278dd10519f50e081a07bbe8f0d4f22a5ad
SHA512ac56596bb93e61d240933353a1d3fd1d5a64dce97e13d381b94190f312ec57be856cd3fdd08c685d6960d734518514b7ecf69284e6371fe8fd96480ae1d76be3
-
Filesize
1KB
MD53e416c7f65c19033c2c17e7f0bc2bfd8
SHA1edc2d8b19e94e8d29579baf5e01c5fe057425712
SHA256fb1d16435bee9ea3fa3d171f3d01818c1c1dd3ce5e47d9292c7b0089ad6f2773
SHA512debae6c61bcf8e34575d4eec2334c27b0205b5a6b428e9f17ff25a55bea845bb5131c68f0ba7384e781b2b9d2dfd1eb2ce93aef47d4fe2dee34a21c147973524