General

  • Target

    DeleteSteamAppCache.exe

  • Size

    105KB

  • Sample

    240814-c5x1yavflc

  • MD5

    89c28eed9c8492dc5f063bc9fc4c8974

  • SHA1

    7535673587fcdb5e9a807dfa7d9826f8cc920480

  • SHA256

    52333c97cd738e82cee05c431ad7fb06f4c00049d5a0f69b2040b6a2e99bc433

  • SHA512

    41eed44b29e28c9781e2e35c5f4bee0eb44ed06a941c9019289d69a7db2ad4bb7658ea7a1072041d42ace2f1033109699cae5a9202a7e00b67b9fe50161e7c5b

  • SSDEEP

    3072:E8e6qmsr9YaOqdY0SZF/gcfPHE3ocu7fa:7DsBLrY0SPRHHja

Malware Config

Targets

    • Target

      DeleteSteamAppCache.exe

    • Size

      105KB

    • MD5

      89c28eed9c8492dc5f063bc9fc4c8974

    • SHA1

      7535673587fcdb5e9a807dfa7d9826f8cc920480

    • SHA256

      52333c97cd738e82cee05c431ad7fb06f4c00049d5a0f69b2040b6a2e99bc433

    • SHA512

      41eed44b29e28c9781e2e35c5f4bee0eb44ed06a941c9019289d69a7db2ad4bb7658ea7a1072041d42ace2f1033109699cae5a9202a7e00b67b9fe50161e7c5b

    • SSDEEP

      3072:E8e6qmsr9YaOqdY0SZF/gcfPHE3ocu7fa:7DsBLrY0SPRHHja

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks