Analysis

  • max time kernel
    105s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-11-2024 20:24

General

  • Target

    SteamtoolsSetup (1) (1).exe

  • Size

    978KB

  • MD5

    bbf15e65d4e3c3580fc54adf1be95201

  • SHA1

    79091be8f7f7a6e66669b6a38e494cf7a62b5117

  • SHA256

    c9f2e2abb046ff2535537182edf9a9b748aa10a22e98a1d8c948d874f4ffb304

  • SHA512

    9bb261b4ed84af846e07ffb6352960687e59428fd497faa0a37d70b57a1a7430d48ac350fbb0c3f0f11e4231a98ebca4d6923deba0949fdd7a247a3c02737355

  • SSDEEP

    24576:4Fa9OUi2VoN2gZ1M8UQag3BXrYZt+GgGTfG74T+TRcL:Z9OUiTN2gZ1MExEZkkf+4TARg

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup (1) (1).exe
    "C:\Users\Admin\AppData\Local\Temp\SteamtoolsSetup (1) (1).exe"
    1⤵
      PID:2392
    • C:\Windows\system32\msinfo32.exe
      "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\ClearApprove.nfo"
      1⤵
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2840
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:728
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5101cc40,0x7ffa5101cc4c,0x7ffa5101cc58
        2⤵
          PID:4068
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1756,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:2
          2⤵
            PID:2352
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1788,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:3
            2⤵
              PID:2040
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2224 /prefetch:8
              2⤵
                PID:4868
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:1
                2⤵
                  PID:4028
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:1
                  2⤵
                    PID:4460
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:1
                    2⤵
                      PID:3592
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:8
                      2⤵
                        PID:4376
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,17487921100258701346,12687824152115161729,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:8
                        2⤵
                          PID:1128
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:4632
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:464
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:3872
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Music\CompareExit.bat" "
                              1⤵
                                PID:3264
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004CC
                                1⤵
                                  PID:2108
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Music\CompareExit.bat" "
                                  1⤵
                                    PID:1572
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1396

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1a0357fa-ed45-4a65-9b3c-60ff2a82f469.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    caebcde9707b1d921a357b838b77e523

                                    SHA1

                                    7e958450c685a34438cc15b8595b6beba67b6c51

                                    SHA256

                                    3811e8dd766c900885c8bf80afcad026fb75c42290af779b5187f5ba1d3b472c

                                    SHA512

                                    04f908dda7789eef391b4e16e614383d4764e96005e53641d852b98005810d6fa261059edcac834b0d1f613d26a97dab6edb2dde38d4dcc5ca48afcf62ab65d7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6f05b125-0d35-48b2-8064-6a9870f5ad16.tmp

                                    Filesize

                                    9KB

                                    MD5

                                    7d84f6e882a1a83aa7997ecd55ffff3b

                                    SHA1

                                    9ea1c65ddc2f40d57cd3543571781e9a82993776

                                    SHA256

                                    b882534441ecfcdc9ffd740bee06bfab33a09b21159b9702d8cbec1332396731

                                    SHA512

                                    ec4891460d3bfc1b2d6c689c34873c76523dee8d69652dba0b5c83a0ee38bed3197a8b12ee4a68121cae998e7114ac32e450da889152cd6288c0ed9382d63167

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    1d204e6e3518033b9ef3e1207183a70d

                                    SHA1

                                    c6ca0308b72c1f21f9b1234030b2c7f8fd757e39

                                    SHA256

                                    8ed88eca2abb96f7ecd292fa73f3a5cbcaebbae95ab0f14b650c6b046f353541

                                    SHA512

                                    ffc382920c77bf03251f2e0e530978c904665140eef6984a229dfbe088dfa861f6cab1292be53329977669f44b0599c87322d1b7209f2aea6e498d1d88ae2b80

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    a94567044619bdfc3cab0f80df587ce9

                                    SHA1

                                    2752dde6f729ac79efa4f5b7b6aa7a4c6b83932e

                                    SHA256

                                    c9f5e0209105475df61c956a9de83f6211371b5e8df20229dbdc3dd4725762cf

                                    SHA512

                                    bcaef46b4cbb67757fed3ed21c9c21df9ea37f19e936a79b52169a6828b4beb08ce866c84ecb3bc0dcf49f010ced81693769a2a200c9996fe8d604c505b74c6a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    356B

                                    MD5

                                    34c885bd289014efcba11c00e185fb6a

                                    SHA1

                                    6368a955fb5efd22845b0ef00e00d3c50ecfe62d

                                    SHA256

                                    55566a2ed25e2de9a3260c7ec50d883ff45784c87c8f7644e9774a169b3401a2

                                    SHA512

                                    fc3aa0cf0cbeafca89a38f1ec280d40ea1ce4eef2c60de372674465530684589ac67b78b810b667dc2ab3bcdba1dcd46eb212a88ba0442242be17e04e853f089

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    19c1c3e0c0bdf494fb9cdf78e9d8f3d9

                                    SHA1

                                    2294016b30d340c68f2b2974121e8666c7f98dde

                                    SHA256

                                    34a637e96c46450fba2e73933134caaee6e6ebac59ce696974a77a66af2003b5

                                    SHA512

                                    2c4fa4fe39121f0d00c66d98bfc91a5f88792fb2745f0d30289bbbbb0c3418f04efa2fea5122e9458ffe9308fafeeb229e6188325c21f5e164e32bedf0dcdfaa

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    0dfa4d82d7e0ffb8754b5b808e6cf5f8

                                    SHA1

                                    5aa311373c41c23ead0b5b461d7d14518922eda4

                                    SHA256

                                    456e7fa361f59fa90ceccdfe9466725f737a3a1006d5fe412c9dafcd93323632

                                    SHA512

                                    9fcdb5a03943a73ac744ce98d98f394d71169346ceb57d4fe50eb3da64c37d8902a4c1d5055edec1d191c87e4747e8eed7a9040ee38386f324bc586f511c7c45

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    9KB

                                    MD5

                                    279d50118f802974d5566736e865f9bb

                                    SHA1

                                    03e8fcf730b2e71b4ed9f886b5adf8a8ea81c28c

                                    SHA256

                                    a63abd8cdb56f90f10326855b9a5fe51357eadf58dff8669c397256661781a58

                                    SHA512

                                    7df379796b36f9ae443f530bf508729a8c1ddd8b05252376c8bf3bd97b42db6841d095ee4d28d9ba876a6e944df95d63ddc2c20b88c0ff77a08394617a5e607f

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    181752e6922044979bf987959fc9c23b

                                    SHA1

                                    3dbb2b21028528fed374ed3c4439103bb7c25e2b

                                    SHA256

                                    cb1203c0b2f257416db84653976ef9b9dd26cd37e59473c7c37647309d0c9b64

                                    SHA512

                                    b30f9b9b54d11acc4945a1a0ae335b3affeac6d7a4c94125b841382dc2ca2f4afe430489bc2ef745c522ae6e0c1b782919af81b15faffeb5747b6d15b88f8fa9

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    5bf78e7ad3b37954846f766c4300f514

                                    SHA1

                                    0c9ab7c31d558de7986c47abbd25fb1ec2761a05

                                    SHA256

                                    3b80da6622b744731b113edf123c46ae49248e04d143c87a0b6e76fd1ba0827f

                                    SHA512

                                    9910664bfc606d95c0e90e760e86a55242fd65785c90fcaa50458f59b52d442667acaa052321941997cc8c73efc28ec4ab51cc5b79ec0e6aaa0669f6d7e1033c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    233KB

                                    MD5

                                    c4f05a1d64ae574932417fec7d33b130

                                    SHA1

                                    73b7ec702efc2d87a25f507a26500f048f925b30

                                    SHA256

                                    e207ee17df9502841fc16e3f7b528928cf6102f0845eff3c60e63900d80ea6c8

                                    SHA512

                                    3d0c44c2565a153f9fed736d349963b502bb021e37c272692ed3bb987bd0a4582b0c738d00a8a52bcb00928b19a8b0de52724c8d20694f2526c9f8078e848fc4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    72870c610763cd192468566fc25d3c2a

                                    SHA1

                                    2f29405f368aafe05e8265b46be35d5d794d20b0

                                    SHA256

                                    e06451a08c783547afb1735103a47a779e880c3c42a0433ac3db1e099b2da8b9

                                    SHA512

                                    6420c03abc83214cbe1339a971e2854f047e73dce5229540d350957b5cc42a3918677cad3d373730ade04d521107353a57ac837bbd73c03c43d9e9a69f8b4770

                                  • \??\pipe\crashpad_728_CZVAICHMQNCWXWOK

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e