Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 11:57
Behavioral task
behavioral1
Sample
steamcommunityup.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
steamcommunityup.exe
-
Size
885KB
-
MD5
134e67601937b96d67555408ef47111a
-
SHA1
0be26d22dc51b03b6f8e270dfddae576c71d815a
-
SHA256
308f1e4f69b4b78371f73e3cd88f2b8db7cceb30b7fbdfd9381bf0a6111805f1
-
SHA512
7f019a187c3408abc73bb863fdc426ab1aa5616c5bf45f59f6861f1b6fced81b24fa6461ec7358dc5be98e47efe49576043dfc657e0a74700d71b4a685adec53
-
SSDEEP
24576:kUWjEmPLnItrxT7jQBODcKwmFPQTdDAEGDdIqGg:kmmPLnIhxvsBODcKBFPQTRAEEIqj
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: steamcommunityup.exe File opened (read-only) \??\k: steamcommunityup.exe File opened (read-only) \??\m: steamcommunityup.exe File opened (read-only) \??\y: steamcommunityup.exe File opened (read-only) \??\z: steamcommunityup.exe File opened (read-only) \??\p: steamcommunityup.exe File opened (read-only) \??\q: steamcommunityup.exe File opened (read-only) \??\v: steamcommunityup.exe File opened (read-only) \??\w: steamcommunityup.exe File opened (read-only) \??\j: steamcommunityup.exe File opened (read-only) \??\l: steamcommunityup.exe File opened (read-only) \??\n: steamcommunityup.exe File opened (read-only) \??\r: steamcommunityup.exe File opened (read-only) \??\b: steamcommunityup.exe File opened (read-only) \??\e: steamcommunityup.exe File opened (read-only) \??\h: steamcommunityup.exe File opened (read-only) \??\i: steamcommunityup.exe File opened (read-only) \??\s: steamcommunityup.exe File opened (read-only) \??\t: steamcommunityup.exe File opened (read-only) \??\u: steamcommunityup.exe File opened (read-only) \??\x: steamcommunityup.exe File opened (read-only) \??\g: steamcommunityup.exe File opened (read-only) \??\o: steamcommunityup.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3692-1-0x00000000007B0000-0x000000000090A000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/3692-0-0x00000000007B0000-0x000000000090A000-memory.dmp upx behavioral2/memory/3692-1-0x00000000007B0000-0x000000000090A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamcommunityup.exe