Analysis

  • max time kernel
    167s
  • max time network
    207s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2023 04:31

General

  • Target

    Chi.exe

  • Size

    384KB

  • MD5

    e6922a68fca90016584ac48fc7722ef8

  • SHA1

    a039ae3f86f31a569966a94ad45dbe7e87f118ad

  • SHA256

    ffb4a81fc336b1d77c81eef96eab0a5249ebb053c8920dd0c02e1d9f3ac257b0

  • SHA512

    33671f3ce8ae5ce1b2852aeb3a601db82b9b8c83bc682abdebf69fb96d878edeb91a21183f1f456d18dd5ed59c797389de912c627d060866fccb580548c96319

  • SSDEEP

    3072:2FHH5FeD8D/6XyNj41ozQDameUGkI81m9+ntccr8jQSaeA83KHGcQ3f4MdwtTDKd:2h5AD876CNmhza9V88A8rcw4MdmxqA

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (902) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chi.exe
    "C:\Users\Admin\AppData\Local\Temp\Chi.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    997ad5ccc4cd534a076656c1508de38a

    SHA1

    d02a0952ecca1fe4cee67927958382f068fce430

    SHA256

    a99adda2ea9707e41d206bce03fb7d0a3250eeebd600ffc677a19dd2a580a1aa

    SHA512

    02e4c3e7eb1e15921c3b00fee023c91d27d7955cf9e27fa20e6f3dfc61c1d054f9cff81266a6e30c8eacc965533816dc105bb225ab455a7f7cc4ebe58e8a52c1

  • memory/1512-0-0x0000000074C10000-0x00000000751BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1512-1-0x0000000074C10000-0x00000000751BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1512-2-0x0000000002250000-0x0000000002290000-memory.dmp

    Filesize

    256KB

  • memory/1512-3-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1512-9-0x00000000003A0000-0x00000000003BA000-memory.dmp

    Filesize

    104KB

  • memory/1512-8-0x00000000008B0000-0x00000000009B0000-memory.dmp

    Filesize

    1024KB

  • memory/1512-10-0x00000000003A0000-0x00000000003BA000-memory.dmp

    Filesize

    104KB

  • memory/1512-291-0x0000000074C10000-0x00000000751BB000-memory.dmp

    Filesize

    5.7MB

  • memory/1512-292-0x0000000002250000-0x0000000002290000-memory.dmp

    Filesize

    256KB

  • memory/1512-298-0x00000000008B0000-0x00000000009B0000-memory.dmp

    Filesize

    1024KB