Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    19-07-2020 19:42

General

  • Target

    chthonic_2.23.17.8.vir.exe

  • Size

    414KB

  • MD5

    1f9b928b344e22ea51231035d780c098

  • SHA1

    b9fea85e753702620038d7ae498fe78360dddd1c

  • SHA256

    bbeaa86003be4d14ff5643c47d20ca8a44e4d7e655bda8a93439fbe7dd4e9066

  • SHA512

    a8cd355326908b9c4161e8df7c9177bd7210049a52009d77ab4b15388ab8d1721607cfffbc7666e5ca17d44d59d834f8e5d1696e7b1f932e7c4dce08ee66484d

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.8.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.8.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1612
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\system32\msiexec.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Checks whether UAC is enabled
      • Checks for any installed AV software in registry
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Deletes itself
      • Adds Run key to start application
      PID:1976
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Adobed\Adobed.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        • Loads dropped DLL
        PID:1844
        • C:\Users\Admin\AppData\Roaming\Adobed\Adobed.exe
          C:\Users\Admin\AppData\Roaming\Adobed\Adobed.exe
          4⤵
          • Executes dropped EXE
          PID:2004

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Security Software Discovery

1
T1063

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobed\Adobed.exe
  • C:\Users\Admin\AppData\Roaming\Adobed\Adobed.exe
  • \Users\Admin\AppData\Local\Temp\A3EC.tmp
  • \Users\Admin\AppData\Local\Temp\A89D.tmp
  • \Users\Admin\AppData\Roaming\Adobed\Adobed.exe
  • memory/1844-3-0x0000000000000000-mapping.dmp
  • memory/1976-1-0x0000000000000000-mapping.dmp
  • memory/2004-6-0x0000000000000000-mapping.dmp