Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 02:06

General

  • Target

    Steamtools New Version/Steamtools 1.61.exe

  • Size

    135KB

  • MD5

    8d266a49cf28ae12227b02975df8db57

  • SHA1

    edcffe00294a46364618f50defcfd45b9d74bcba

  • SHA256

    4a5bc2cbf22210d7036303531dc5edf3df0f32d35b04f697efad1b2268b6ef20

  • SHA512

    7fa1d4eb4f3365a41e3b3d9d361a4b435d2c2820796cb4352e7111d5a8f797c3a4da949ca25bf0314a0545cc35509d0c81909432ecb1a6162099985ff6a4f26c

  • SSDEEP

    3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfO+hBuo:rjK4TDUqgpqWDLZ5H+xuZ045hA

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Steamtools New Version\Steamtools 1.61.exe
    "C:\Users\Admin\AppData\Local\Temp\Steamtools New Version\Steamtools 1.61.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.8&gui=true
      2⤵
      • System Time Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6ad961b5c225708cffae2bc0759814c

    SHA1

    865a6a7ec2e63c38e6d594edfe6043c8cee19daa

    SHA256

    ce6d20a7c1100dde183aef3d9db7e04b547726bdaebd1843bc73289db86015df

    SHA512

    b853a93a3d0ed261d06c283a1d85191b78b68e3634344e6cf3bac2631a56e04e779633ff3ab845dcca0c044bcfcf7fbecace81acb7ab28acbe385e54b22696c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f044e07a25bec6447f8de3c7050f0f

    SHA1

    db68b56a9b953ded5ef06e8fc068187754e49019

    SHA256

    fa03dd50c0639d411edc3d2486dd1a0f98bfeab4fb592b94b263da85041c4a91

    SHA512

    c1cde6d58ec32f84f2cbeacb6df3ff1d006d812bb5b110e1ebf1dff789187c9f29dda5677caf86a4593f4d7c9d362cda1266ae62c2a4c2b2d372f3c03d8d5658

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4deaa43d219f7eceb0f195a97e3da35

    SHA1

    0fabd76763dced54b87241ee8a55bb5d17f64e86

    SHA256

    c16cb7337ff1a5bfcd71b3e5c96deb9223cf473e89da083fc05918f6b0ba0758

    SHA512

    0350547c03d65c7a975bcf1c2be4e85cb7eeaa32ee0ecc90f96d4f091e45cec30c9046434668761b216eff1dcaabdf1939c3469793d92371cf881bb457712e9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ae81f20b6d061f621881c140934c569

    SHA1

    12425a75b0e0f96290b5aa56d8128e7e719ae531

    SHA256

    e39d05cd6990ab28a5b84eeae541c73b17a06305d77b7299ad0bdae66b1c65b7

    SHA512

    377a94ea6866190abcc435958c9032739e3dacc1cd701b495259896cc015033e9e5f8ac367a131f292ba20a6cfd359ff39e90fa603ccc5ea7b98cd29a5c33d26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd35181f9d70225d7e78f4a1f0a276df

    SHA1

    dc7f6d21246fcf8270123a8ef1dd1b7722967301

    SHA256

    72055f0bc6f39fa72a3a6b7aad423a8b66d7068f2c164be4d23d49350f69519e

    SHA512

    579ae650661962f7e080a8926182a59f122652208ab8bdeeb0650eff61c1ea14c18de490c801555542b601f4d3cd72b03acc6b20eee744aaa57b5b9ea577c889

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8fc775bf1a1472837a9b4feb6ce8891

    SHA1

    f980b4fa8f71170454a092996eee8f7c0cbbefe2

    SHA256

    5eddf23c07c3d86dec20158b79a45c1dfb350570e9a19785b31e80e98f9d6411

    SHA512

    0fa569e083f97de5d0e2b7574001b7015609b6b6502b1acea2c28a355fa0f2c814c6a2e9e732f8bd19241346d8037ad287adeaf4659180f77914bd2b19fc6653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0923db8e1039d308342ec2c47a078f21

    SHA1

    ce480f5af810cc694e6134f947bf800279c22dc5

    SHA256

    954aacd3d5adcc0b527052ca37099472ced4f6f91a9848d49c175c6c8893bdf2

    SHA512

    9d96f624b55f569cd4dc616b26324c8799d89b41fc59ec351e48b338a0f07f01796f6c576f87e155c5471f8a2bb46b450d026290409f102546a44091bfdf5c6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12b25e8a12057b89d4279f222ec371ba

    SHA1

    3d8c939ceff8a09088bf4a8122dcd491f8d054ad

    SHA256

    766cc10c692677241bdb8fc58131c668c3d42875bc37fcc8278dfd2da7d573c3

    SHA512

    9580140e2d931c735ec3059207954b97a4f5a956d91904bd78998d5bd924fe9fbd59ba956a443fe8a6d62df6bc189cc39a6a1f90f34118b9358cf67c99e83f62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84e55626e98cfac14e4dc6c76a655f7d

    SHA1

    b51fa8156cbb48fc7259c20a143490919c52574b

    SHA256

    1495ca63a893eabf74bbc6e2fcc7765d98dc3f3571748a3e705a44dd20635710

    SHA512

    96c0b2cc936072520a47af41d31bf6847dd2c8ffef645fe1197133ec53e99b34020c34ce6654be13aca666c2a9b50ff321abe4d19ed54a0381d0a285c72dca0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6cd9fd7dc95e701a525672b92bb8cb9

    SHA1

    b847a6ef55cca12242810c3552d075a83ed649bd

    SHA256

    eae4f8abe09b04ca13559a47ade1aa69996e357f2dd15fedf1b75ee2b1f29377

    SHA512

    fa019619f666cd4e62db3c3c6e03d9c41bc03db01d9117c6b947e9e418f5a990ac1b772cd9f231e19a6a9cb53dc26154773e00202decae15a74d0728a99b534b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cc2b3b5f43ef62d41130b33e48f9eb8

    SHA1

    698248fb4b46df24527a2bb97dec22bbc83625b7

    SHA256

    211243b172da5a43275769fe41f1497166f520e209f2725169b08b7248dd4c85

    SHA512

    03c6d365e523f3ea1ed9a909f4a7f09bda64b216814328b9b5d8f11d6e7d271d2aabec76ffb8481dc8a006e98f8f8866fcae0c14c00e005026c648971d871f43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d17c809b4cb530e3ac329dd84f4bfe5

    SHA1

    c5d39ae4bb735e59977d9ec8a9f8946c21763943

    SHA256

    379967a3b8b9bdfa07300c2905af68e03a5dfc814b3beaffcb531eec4c700d27

    SHA512

    225159476328e5179ed9737c481801073facef4b3240896af9ee10545841d76c5045b99d72b4be34f02cd6a8f62e19638ab3cac10a1cded15c5afbf1e9663675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bfa9257748d2cdf3691b36b8d05aed8

    SHA1

    a95d9f90657600c1cc562209ff088a97fe1f87ec

    SHA256

    ceb1b5facf46caadf892a1321deeb3ac195ef5fd2a7b7b7a093ab0e3d08e1215

    SHA512

    ddbc142a44361de3081eb9d79760661dbf8892f08b992cf8ec4688fc92bfdb0873d47467395c46ceef3de47104155839236f1027c8a6d9c7a78c9e4711fb77f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dec99295ee44e7ac53110afe48b9dfcf

    SHA1

    09633709f1f417f26a11874d70558cb90e437728

    SHA256

    6374bd5f80a345a27feee93073929ea31eede916b8b4abda83d3bfa35d21494a

    SHA512

    9e74c67c4d81050d107ca08100d219ac6ba57a9aa973eb54e1091edac72f28f89846bf6739361fcd36bbab34181da034e12f0d8a7726d317ae373629d10cc70d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6eb466815e0ab2f902b7c3f31257eb6

    SHA1

    ff6bec49492cd7396831a808d3ecc2f5e9c2d762

    SHA256

    6f77097bc5be61a97c3d66f5df0e56ef01887f94e3b84430b8542294dbd9faed

    SHA512

    9128ef9f1b9b397964ae7b48ebf69e4472ddb7d79f8d491be47526c4a81e49f0e0c47d5fd3ceb91fe70ffc8f2002d775759253314875a1ee78cce14fae8657b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fbc800908a4a6efdc3df0a12ef29dbb

    SHA1

    7934ceb4f7aec9d4d7bffcb2d8a67a50360e39c4

    SHA256

    57e5b8b00ebe9897f7bce7f1e155c270bc5d2387f5037f9c46c4826ae6167ddb

    SHA512

    5e7b7e5ce0a39b78ee062041fe43f498f5708ea681f4fffe14dadc6b97c0cf1a9bf97756913ae79e394123234add091fb2b27a77a8081efeaee7a3e4bcc7ab79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6de598bb531d0c5476971848f45eff6

    SHA1

    d47b40be0b5bd797f73c238263845b68806fabb5

    SHA256

    c6232e92d1e5d8d5e2a3f6d22bb6f9d5be914d821a14466231e7056b12613b5c

    SHA512

    d1bb14ca1524f4f8380738c45f6dd5a12348f6dd02fe1741b00a8b2e43d2791b2e2ab22a9af8f8c2ac87a3b7c28bf5147c7bf1158145d846d440eec3c1e02079

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    637563c016d163f0594315ea847da844

    SHA1

    e1a59202adcc35ffcd47769c43715220f01c3285

    SHA256

    a919d82770dd9a7e452cc959949147880cc8c1cab99d898bb4351425fee5b24f

    SHA512

    ae6d5ec98d9598ace11a904c5560b205eb569778b90cf4ad7b82a169e4e677b3117a29f328b53e48e978b80fa701551aae8ae790acda700208cf87ef24cdbfbf

  • C:\Users\Admin\AppData\Local\Temp\Cab88B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar969.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2520-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB