Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 19:42

General

  • Target

    chthonic_2.23.17.8.vir.exe

  • Size

    414KB

  • MD5

    1f9b928b344e22ea51231035d780c098

  • SHA1

    b9fea85e753702620038d7ae498fe78360dddd1c

  • SHA256

    bbeaa86003be4d14ff5643c47d20ca8a44e4d7e655bda8a93439fbe7dd4e9066

  • SHA512

    a8cd355326908b9c4161e8df7c9177bd7210049a52009d77ab4b15388ab8d1721607cfffbc7666e5ca17d44d59d834f8e5d1696e7b1f932e7c4dce08ee66484d

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.8.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.8.vir.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\system32\msiexec.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Deletes itself
      • Checks for any installed AV software in registry
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Adds Run key to start application
      • Checks whether UAC is enabled
      PID:2196
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\lite1\lite1.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\AppData\Roaming\lite1\lite1.exe
          C:\Users\Admin\AppData\Roaming\lite1\lite1.exe
          4⤵
          • Executes dropped EXE
          PID:3832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Security Software Discovery

1
T1063

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\lite1\lite1.exe
  • C:\Users\Admin\AppData\Roaming\lite1\lite1.exe
  • \Users\Admin\AppData\Local\Temp\2646.tmp
  • \Users\Admin\AppData\Local\Temp\2C51.tmp
  • memory/2196-1-0x0000000000000000-mapping.dmp
  • memory/2752-3-0x0000000000000000-mapping.dmp
  • memory/3832-4-0x0000000000000000-mapping.dmp