Analysis
-
max time kernel
44s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 21:04
Behavioral task
behavioral1
Sample
SteamFix64.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SteamFix64.dll
Resource
win10v2004-20240802-en
General
-
Target
SteamFix64.dll
-
Size
1.2MB
-
MD5
c21f161363b7a1c9a4cda780e99f1dcd
-
SHA1
5b6f4e4b8fe321c70e5037e381dabc633e6f18de
-
SHA256
b543786376bd7a1ff82d17b9e766cc5f42f40e8c2f3eebe4923d75c8ec74c518
-
SHA512
1762877e2312526b210d9935388b4b3badd88e2e48dd715681256d3a15b9c9d6c4c896c115c4bcb2ad3ad89bb3dc811f0fcfb5ae0871432cf9650c7e64a7ad9c
-
SSDEEP
24576:ywlFrCW6vkYe4ipRQ+vCjLl/GPYdZdi7Yvf80eQi+j8u:ywlFrLYOfQ+vELl/GPYdZ6af80eQi+n
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2256-1-0x000007FEF6680000-0x000007FEF6882000-memory.dmp vmprotect behavioral1/memory/2256-2-0x000007FEF6680000-0x000007FEF6882000-memory.dmp vmprotect behavioral1/memory/2256-5-0x000007FEF6680000-0x000007FEF6882000-memory.dmp vmprotect -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2060 2052 chrome.exe 30 PID 2052 wrote to memory of 2060 2052 chrome.exe 30 PID 2052 wrote to memory of 2060 2052 chrome.exe 30 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2852 2052 chrome.exe 32 PID 2052 wrote to memory of 2600 2052 chrome.exe 33 PID 2052 wrote to memory of 2600 2052 chrome.exe 33 PID 2052 wrote to memory of 2600 2052 chrome.exe 33 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34 PID 2052 wrote to memory of 2772 2052 chrome.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SteamFix64.dll,#11⤵PID:2256
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef77f9758,0x7fef77f9768,0x7fef77f97782⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:22⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1136 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:22⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1384 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:12⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3416 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1296,i,8681795423587541311,4336018635721110043,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State~RFf7b1fb1.TMP
Filesize987B
MD5881550eb8a43297bbf27467faf0b052d
SHA18b9591b19697222addfc33175cab0015de3f9298
SHA25690a984b01fefff7a64952edbaba1240cb2497b6b3d0fef9d6284e5221c257cf5
SHA512b3941f96e2ea7a9a43a2a3e1c09bd9bdd8a816de97ffaf9a93795e728fe5c1bd2821283a1846f35ecdd427be9508ce27e9ea7ae71759e381d7ca171f23796932
-
Filesize
5KB
MD531348877db315917f6f342aa649a67cd
SHA1b368842aab7e578b13e207815f46efa4569c5357
SHA2561acd83049da4e960490968b67fbadcea0134f2532e103b6abd9f208df4538f31
SHA512542baf90dac39f68d49be6782946379920c305f9b70e740d454249ddf9bbac22fc45e570b39828151721ecf47a000dc8b567c83fc31f8a27b5df080a8cbef4f9
-
Filesize
5KB
MD5106d2755175cc34c2f93ddba461a58f8
SHA18a3c578491df071b8ceb14afe780dd30f9dca6ea
SHA256758286f3a98330871f23f2a2ddf51f4f183d5c23d1ad6547b67d3f2adf81d85e
SHA512d099b8b310363ebcf296c680f0bc6fd6b77bc83c961be42c93b70e2cb31e411a0134be44e1e2f2229a64a9865ca43dcfc8a6eb29c89d2a5d71fc5496034e07d7