Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 20:02
Behavioral task
behavioral1
Sample
SteamServersFix.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SteamServersFix.exe
Resource
win10v2004-20241007-en
General
-
Target
SteamServersFix.exe
-
Size
327KB
-
MD5
a4b716a88bd9bffe93238cf361d2bb9b
-
SHA1
a8d98a27fe2c4d36b0093d518660afe5f8f59208
-
SHA256
fa01f82861a9949b4bddcadd6c2c5fd707b07c6a4090b08a19e932236c04feb9
-
SHA512
65d1c05de9634c4fc6562233010b473dabf13507108fd9ba83842598a72270b57added822726bb71585a5c70a8355940258c322cfe427e150d7e579f067421a6
-
SSDEEP
6144:zqW6/EpyjHwbECuizo+GIIIIIIIhIIIIIIIIIIIIIIIU:zj0tCuizL
Malware Config
Extracted
xworm
vshostupdater.duckdns.org:1177
http://vshostupdater.duckdns.org:1177
octothl-21053.portmap.host:21053:1177
189.14.62.242:1177
192.168.1.6:1177
187.18.72.113:1177
189.14.53.123:1177
-
Install_directory
%AppData%
-
install_file
SteamProcFix.exe
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2324-1-0x0000000000E00000-0x0000000000E58000-memory.dmp family_xworm behavioral1/files/0x0004000000004ed7-10.dat family_xworm behavioral1/memory/2576-12-0x00000000013E0000-0x0000000001438000-memory.dmp family_xworm behavioral1/memory/2808-15-0x00000000002F0000-0x0000000000348000-memory.dmp family_xworm behavioral1/memory/2976-17-0x0000000000E50000-0x0000000000EA8000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SteamProcFix.lnk SteamServersFix.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SteamProcFix.lnk SteamServersFix.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 SteamProcFix.exe 2808 SteamProcFix.exe 2976 SteamProcFix.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\SteamProcFix = "C:\\Users\\Admin\\AppData\\Roaming\\SteamProcFix.exe" SteamServersFix.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1020 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2324 SteamServersFix.exe Token: SeDebugPrivilege 2324 SteamServersFix.exe Token: SeDebugPrivilege 2576 SteamProcFix.exe Token: SeDebugPrivilege 2808 SteamProcFix.exe Token: SeDebugPrivilege 2976 SteamProcFix.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1020 2324 SteamServersFix.exe 31 PID 2324 wrote to memory of 1020 2324 SteamServersFix.exe 31 PID 2324 wrote to memory of 1020 2324 SteamServersFix.exe 31 PID 2652 wrote to memory of 2576 2652 taskeng.exe 35 PID 2652 wrote to memory of 2576 2652 taskeng.exe 35 PID 2652 wrote to memory of 2576 2652 taskeng.exe 35 PID 2652 wrote to memory of 2808 2652 taskeng.exe 36 PID 2652 wrote to memory of 2808 2652 taskeng.exe 36 PID 2652 wrote to memory of 2808 2652 taskeng.exe 36 PID 2652 wrote to memory of 2976 2652 taskeng.exe 38 PID 2652 wrote to memory of 2976 2652 taskeng.exe 38 PID 2652 wrote to memory of 2976 2652 taskeng.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SteamServersFix.exe"C:\Users\Admin\AppData\Local\Temp\SteamServersFix.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SteamProcFix" /tr "C:\Users\Admin\AppData\Roaming\SteamProcFix.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1020
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8A8EFB4D-93E9-4B94-8C60-A685B84D4003} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\SteamProcFix.exeC:\Users\Admin\AppData\Roaming\SteamProcFix.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Roaming\SteamProcFix.exeC:\Users\Admin\AppData\Roaming\SteamProcFix.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Users\Admin\AppData\Roaming\SteamProcFix.exeC:\Users\Admin\AppData\Roaming\SteamProcFix.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5a4b716a88bd9bffe93238cf361d2bb9b
SHA1a8d98a27fe2c4d36b0093d518660afe5f8f59208
SHA256fa01f82861a9949b4bddcadd6c2c5fd707b07c6a4090b08a19e932236c04feb9
SHA51265d1c05de9634c4fc6562233010b473dabf13507108fd9ba83842598a72270b57added822726bb71585a5c70a8355940258c322cfe427e150d7e579f067421a6