Overview
overview
7Static
static
3awd.rar
windows11-21h2-x64
7awd/SteamS...1).exe
windows11-21h2-x64
6$PLUGINSDI...er.bmp
windows11-21h2-x64
3$PLUGINSDI...rd.bmp
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...ch.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...ch.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...ch.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...ek.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...se.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...na.txt
windows11-21h2-x64
3public/ste...am.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...se.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...an.txt
windows11-21h2-x64
3public/ste...se.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...sh.txt
windows11-21h2-x64
3public/ste...se.txt
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
4awd/Steamt...1).exe
windows11-21h2-x64
1Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
awd.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
awd/SteamSetup (1).exe
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
public/steambootstrapper_brazilian.txt
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
public/steambootstrapper_bulgarian.txt
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
public/steambootstrapper_czech.txt
Resource
win11-20241023-en
Behavioral task
behavioral8
Sample
public/steambootstrapper_danish.txt
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
public/steambootstrapper_dutch.txt
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
public/steambootstrapper_english.txt
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
public/steambootstrapper_finnish.txt
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
public/steambootstrapper_french.txt
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
public/steambootstrapper_german.txt
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
public/steambootstrapper_greek.txt
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
public/steambootstrapper_hungarian.txt
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
public/steambootstrapper_indonesian.txt
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
public/steambootstrapper_italian.txt
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
public/steambootstrapper_japanese.txt
Resource
win11-20241023-en
Behavioral task
behavioral19
Sample
public/steambootstrapper_korean.txt
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
public/steambootstrapper_koreana.txt
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
public/steambootstrapper_latam.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
public/steambootstrapper_norwegian.txt
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
public/steambootstrapper_polish.txt
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
public/steambootstrapper_portuguese.txt
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
public/steambootstrapper_romanian.txt
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
public/steambootstrapper_russian.txt
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
public/steambootstrapper_schinese.txt
Resource
win11-20241023-en
Behavioral task
behavioral28
Sample
public/steambootstrapper_spanish.txt
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
public/steambootstrapper_swedish.txt
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
public/steambootstrapper_tchinese.txt
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
awd/SteamtoolsSetup (1) (1).exe
Resource
win11-20241007-en
General
-
Target
uninstall.exe
-
Size
155KB
-
MD5
32109e2aac377fa07b849f4f4033edc5
-
SHA1
a7b87a221744fb2e36327be0a34c17b7d734c47f
-
SHA256
72ffe8859eaa63637f5a62b7c454241db35938f8326f6ccf20352e00f8df2fe5
-
SHA512
688d9b51060d84c4e2dd0ddbb20d43bbc8bf93a903f26e855f546335bd7a5c9ef5c6f888dff35d379cbb1d782c5e231b33831b7272cde2b40c2d7fc2b85ffc0d
-
SSDEEP
3072:iIAe+3aJpgWXTBuq/JFONM2cZ6iKowuq12ApG3s/6:izB+pgURJFOS21iQ5i+6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Un_A.exepid process 1016 Un_A.exe -
Loads dropped DLL 1 IoCs
Processes:
Un_A.exepid process 1016 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
uninstall.exeUn_A.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
uninstall.exedescription pid process target process PID 4988 wrote to memory of 1016 4988 uninstall.exe Un_A.exe PID 4988 wrote to memory of 1016 4988 uninstall.exe Un_A.exe PID 4988 wrote to memory of 1016 4988 uninstall.exe Un_A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD546ba3881f8b27f54a8d92d600e61ee7b
SHA115933b6ece85a6d45fd78ae499b445a3bc6d2d05
SHA2564fca692a36f0c99e26b5bc7ef9db5269d2c1e21288184953898130fea9b1c4fc
SHA5126f64d3cb4634ed51710f578667b92a429aa871a0a141092df3cf7e0134a0b145f802f91126f1ce43ddb4b9d6cc6fb875c9acec22eab0cec86a72dd916e1f9eb3
-
Filesize
155KB
MD532109e2aac377fa07b849f4f4033edc5
SHA1a7b87a221744fb2e36327be0a34c17b7d734c47f
SHA25672ffe8859eaa63637f5a62b7c454241db35938f8326f6ccf20352e00f8df2fe5
SHA512688d9b51060d84c4e2dd0ddbb20d43bbc8bf93a903f26e855f546335bd7a5c9ef5c6f888dff35d379cbb1d782c5e231b33831b7272cde2b40c2d7fc2b85ffc0d