Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/08/2024, 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/st2024/Steamtools/releases
Resource
win10-20240404-en
General
-
Target
https://github.com/st2024/Steamtools/releases
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133678844336517912" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2828 2840 chrome.exe 73 PID 2840 wrote to memory of 2828 2840 chrome.exe 73 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 3648 2840 chrome.exe 75 PID 2840 wrote to memory of 4512 2840 chrome.exe 76 PID 2840 wrote to memory of 4512 2840 chrome.exe 76 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77 PID 2840 wrote to memory of 976 2840 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/st2024/Steamtools/releases1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff62989758,0x7fff62989768,0x7fff629897782⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:22⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2844 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1852,i,12951775538932707831,14144665128152018166,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c7b98ce8448953d947749c8720a2908
SHA182497d24aa76a390b90d3bf1cda2cbfea0c3ee5d
SHA256c69a3a6defc6c9fcdabccb08d90a5cc03ac79c2561a472a433015699482f1165
SHA5126b3d62039e6e806ae17375e16796f26c50e3287bdf025c2fff1dbade29947bf94d81bc892778e63a3a91299ae0b68be33951a9dd192faaa2fa9ff6e85789338e
-
Filesize
1KB
MD5cf4a489a4c728701a05701bdfe91bdde
SHA1db6f5d00787b41843f6d8655180b46dfb8cf7ff6
SHA25664131a114b0f49733a43e7e681dfb227647bca67993c33f1652656d6b7037746
SHA51287fb2ec02a45e0fa18ed2625444dae71f1d7e21dfc3a7e27f1766e202cd8d2bb063bde9bc2f0e24cbb2f09dc64574901dc9106543c6e5ad771ca01cf6a2ffa5b
-
Filesize
1KB
MD510e64cdc1b3e206c41f53627c2d0661e
SHA1689f32b72ef6c622a6c5c1ba87f1f808a2327368
SHA256c30e8e565049872d794af2b802a2e2e44f0203754908fa4f5a4c283313f8e753
SHA512e10c13262e6322bb291ee18c22e29d05042e5768df9cada059ab4b244f6401193d245089c26d62becac1f49281c6a0cec301450e587da1cb6d9938bb41daf78d
-
Filesize
6KB
MD524367fcf9ad25a2e08096640ec80460d
SHA163cf589f2725ec202857324ca3f203e1764d41f3
SHA256f09ccd9445383ba3758167ab9a4577c288cb83b2c9d28d808b68c4766cda8856
SHA512965cff8a06ee6df5488361ee45e58d1ccea4e92f1de4a8c816b190cd9cfcad2be6631b11c739ea7f15790ad751cd6975abcd741bd88531d1c25eb023bc0a6de5
-
Filesize
6KB
MD57427edd53108155ef4c9c38e8d44d4df
SHA1ff4c9a17e052a9e2b554483f8988f3491a7da987
SHA25661e5e3f235bd243236d9dddb4cd076caba2d5c80ef0a936810a568879b3e928f
SHA512a8ef76160c0ff5d3732c2e49c80d91c3902fb925b9d609bc76a0dab5c88acdaa2a53b4c0cb8f080384273b87e0f75624630985fec45c49746a5951a6e9cacd66
-
Filesize
6KB
MD5723e6b1eb03c70d64316e728a3267bd7
SHA12e5a3d39f75ecd6e7953138fc4ac1e3ef569b614
SHA256773f72ad9920d42dbcab6c5fb79584aa34905ad6e7f217c5c5e09a9377334971
SHA5128a587de6e123476b52df0c8215a7a5d00148b355d7d888eaba0efb50fbdaeafe9c4211defe559146e5064d982caf298fe1caf71a915ba535d12efb486fb77531
-
Filesize
136KB
MD5029c5f0596d686fb7039819e295c2c71
SHA101f0844a8f85f296dbb6ec3ef6d9ddea3abab271
SHA2563f4248d978a9804b4f1dda7148132c900cbbe62b5687694e4cbcce9cca49f751
SHA5128774f30e398c6bf846950c2c15fa50a535ed6e610f4b1a8667aab6512f6318cd0730ab360401b70361cacdb76241dfe0353a3149f68dc155e4c86e6ac50d1342
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd