Analysis
-
max time kernel
51s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-01-2023 09:21
Static task
static1
Behavioral task
behavioral1
Sample
Chater_Rqst_rh_0.4.1 4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Chater_Rqst_rh_0.4.1 4.exe
Resource
win10v2004-20221111-en
General
-
Target
Chater_Rqst_rh_0.4.1 4.exe
-
Size
1.7MB
-
MD5
fc0ef831ee6dcd34f1cc1e3b484b139b
-
SHA1
c864404fddc9e946a52cbc4c54c1b450e70d76b0
-
SHA256
2a99f25f4212f53d7479bfb140c572ca9f44394fbc4817743b1338cddf95a2d6
-
SHA512
6438c021d82def59fd9aa087e301c0ebafd9dfadc59ba4cc645c92634d19040426159357654f11614bcb649c8da51cc1f4f3e264d3be87472c4e3ef70308c0a7
-
SSDEEP
24576:eK5eCX7JpFCcuBLN/TrReV1sHXLgAE4SDExTwoOFzJg4J2Yq1/FcULgBi/E7V+AR:ejTfecT3OuYq12UqIg
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 532 Chater_Rqst_rh_0.4.1 4.exe 532 Chater_Rqst_rh_0.4.1 4.exe 532 Chater_Rqst_rh_0.4.1 4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Chater_Rqst_rh_0.4.1 4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 532 Chater_Rqst_rh_0.4.1 4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1540 AcroRd32.exe 1540 AcroRd32.exe 1540 AcroRd32.exe 1540 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 532 wrote to memory of 1540 532 Chater_Rqst_rh_0.4.1 4.exe 26 PID 532 wrote to memory of 1540 532 Chater_Rqst_rh_0.4.1 4.exe 26 PID 532 wrote to memory of 1540 532 Chater_Rqst_rh_0.4.1 4.exe 26 PID 532 wrote to memory of 1540 532 Chater_Rqst_rh_0.4.1 4.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe"C:\Users\Admin\AppData\Local\Temp\Chater_Rqst_rh_0.4.1 4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\65C6.tmp.pdf"2⤵
- Suspicious use of SetWindowsHookEx
PID:1540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD52089766457ca94fa37e9702e4aac01df
SHA1cb4a5f34497d8e2d8c619380f6142437b3e48e70
SHA256b70b7cced61190ae1e8b108f05b9c4e6f8aaa0d5b97b46e5b785c8dce13716df
SHA512d8e45db3c93962caa92fc757c100526daa1ca41a744e7cf15169b9a36639c8828d85ebb2ddaac5baa49afd456f950c41d4ba9df5e208c1a6c93080e724f3fc7e