Analysis
-
max time kernel
107s -
max time network
110s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-11-2024 18:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SteamtoolsSetup.exe
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
5 signatures
150 seconds
General
-
Target
SteamtoolsSetup.exe
-
Size
978KB
-
MD5
bbf15e65d4e3c3580fc54adf1be95201
-
SHA1
79091be8f7f7a6e66669b6a38e494cf7a62b5117
-
SHA256
c9f2e2abb046ff2535537182edf9a9b748aa10a22e98a1d8c948d874f4ffb304
-
SHA512
9bb261b4ed84af846e07ffb6352960687e59428fd497faa0a37d70b57a1a7430d48ac350fbb0c3f0f11e4231a98ebca4d6923deba0949fdd7a247a3c02737355
-
SSDEEP
24576:4Fa9OUi2VoN2gZ1M8UQag3BXrYZt+GgGTfG74T+TRcL:Z9OUiTN2gZ1MExEZkkf+4TARg
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
taskmgr.exepid process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 3568 taskmgr.exe Token: SeSystemProfilePrivilege 3568 taskmgr.exe Token: SeCreateGlobalPrivilege 3568 taskmgr.exe Token: 33 3568 taskmgr.exe Token: SeIncBasePriorityPrivilege 3568 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
taskmgr.exepid process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
taskmgr.exepid process 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe 3568 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup.exe"1⤵PID:2040
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3568