Analysis

  • max time kernel
    51s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2023 09:21

General

  • Target

    Chater_Rqst_rh_0.4.1 4.exe

  • Size

    1.7MB

  • MD5

    fc0ef831ee6dcd34f1cc1e3b484b139b

  • SHA1

    c864404fddc9e946a52cbc4c54c1b450e70d76b0

  • SHA256

    2a99f25f4212f53d7479bfb140c572ca9f44394fbc4817743b1338cddf95a2d6

  • SHA512

    6438c021d82def59fd9aa087e301c0ebafd9dfadc59ba4cc645c92634d19040426159357654f11614bcb649c8da51cc1f4f3e264d3be87472c4e3ef70308c0a7

  • SSDEEP

    24576:eK5eCX7JpFCcuBLN/TrReV1sHXLgAE4SDExTwoOFzJg4J2Yq1/FcULgBi/E7V+AR:ejTfecT3OuYq12UqIg

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe
    "C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\65C6.tmp.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\65C6.tmp.pdf

    Filesize

    17KB

    MD5

    2089766457ca94fa37e9702e4aac01df

    SHA1

    cb4a5f34497d8e2d8c619380f6142437b3e48e70

    SHA256

    b70b7cced61190ae1e8b108f05b9c4e6f8aaa0d5b97b46e5b785c8dce13716df

    SHA512

    d8e45db3c93962caa92fc757c100526daa1ca41a744e7cf15169b9a36639c8828d85ebb2ddaac5baa49afd456f950c41d4ba9df5e208c1a6c93080e724f3fc7e

  • memory/532-54-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/532-58-0x0000000032DB0000-0x0000000032EB0000-memory.dmp

    Filesize

    1024KB

  • memory/532-59-0x00000000006F0000-0x000000000070E000-memory.dmp

    Filesize

    120KB

  • memory/532-61-0x0000000033DC0000-0x0000000034A0A000-memory.dmp

    Filesize

    12.3MB

  • memory/532-62-0x00000000006F0000-0x000000000070E000-memory.dmp

    Filesize

    120KB