Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 19:25
Static task
static1
Behavioral task
behavioral1
Sample
chthonic_2.2.2.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
chthonic_2.2.2.0.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
chthonic_2.2.2.0.vir.exe
-
Size
124KB
-
MD5
eeac9de24d64a8cdbc5a3efabf736b2f
-
SHA1
b57aef1904ffd2e7a0014848ba1870048f150816
-
SHA256
262a89d01968ca23f76f345aeb75d88cc6c65b02fd471d7d2adaa083d3d57d03
-
SHA512
3b185cbde217e92cbdd2abf17a68b4977338abc47a121f8d4bd14cf6ae6d4725c9c7cefa0cf1f397037ee452a3c701b8313830e789058455d09a57283d5c5f3d
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
chthonic_2.2.2.0.vir.exepid process 2784 chthonic_2.2.2.0.vir.exe 2784 chthonic_2.2.2.0.vir.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chthonic_2.2.2.0.vir.exepid process 2784 chthonic_2.2.2.0.vir.exe 2784 chthonic_2.2.2.0.vir.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
chthonic_2.2.2.0.vir.exedescription pid process target process PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe PID 2784 wrote to memory of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
chthonic_2.2.2.0.vir.exedescription pid process target process PID 2784 set thread context of 3844 2784 chthonic_2.2.2.0.vir.exe iexplore.exe PID 2784 set thread context of 3812 2784 chthonic_2.2.2.0.vir.exe chthonic_2.2.2.0.vir.exe -
Processes:
resource yara_rule behavioral2/memory/3844-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3844-3-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3844-4-0x0000000000400000-0x0000000000414000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\chthonic_2.2.2.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\chthonic_2.2.2.0.vir.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\chthonic_2.2.2.0.vir.exeC:\Users\Admin\AppData\Local\Temp\chthonic_2.2.2.0.vir.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3812-2-0x0000000000400000-0x0000000006800000-memory.dmpFilesize
100.0MB
-
memory/3812-5-0x0000000000401CBF-mapping.dmp
-
memory/3844-0-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3844-1-0x0000000000412110-mapping.dmp
-
memory/3844-3-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/3844-4-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB