Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 06:34

General

  • Target

    PAIcom/PAIcom/steam.bat

  • Size

    34B

  • MD5

    beb642d83777b5632d01b12f1b7de945

  • SHA1

    7c72da4c48fe178a87aacc3031db420f30183b63

  • SHA256

    93d4ef7b160ded75ea681ac114100ec28ecbd4f8b44762d33b39449954ac70cf

  • SHA512

    3e82498954dd98dea227184415006c7d7be5db11f66a8129d4262fc9c9ca048c1b520d41179bc8ab036a90409ecf7a4cf6898d9cad5aed3e417fdc5a4bce54f2

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\PAIcom\PAIcom\steam.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\explorer.exe
      explorer "steam://nav/games"
      2⤵
        PID:1764
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
        PID:2452

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2452-0-0x00000000020B0000-0x00000000020B1000-memory.dmp

        Filesize

        4KB

      • memory/2452-1-0x00000000020B0000-0x00000000020B1000-memory.dmp

        Filesize

        4KB