Analysis

  • max time kernel
    177s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2023 04:31

General

  • Target

    Chi.exe

  • Size

    384KB

  • MD5

    e6922a68fca90016584ac48fc7722ef8

  • SHA1

    a039ae3f86f31a569966a94ad45dbe7e87f118ad

  • SHA256

    ffb4a81fc336b1d77c81eef96eab0a5249ebb053c8920dd0c02e1d9f3ac257b0

  • SHA512

    33671f3ce8ae5ce1b2852aeb3a601db82b9b8c83bc682abdebf69fb96d878edeb91a21183f1f456d18dd5ed59c797389de912c627d060866fccb580548c96319

  • SSDEEP

    3072:2FHH5FeD8D/6XyNj41ozQDameUGkI81m9+ntccr8jQSaeA83KHGcQ3f4MdwtTDKd:2h5AD876CNmhza9V88A8rcw4MdmxqA

Malware Config

Signatures

  • Chimera 47 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chi.exe
    "C:\Users\Admin\AppData\Local\Temp\Chi.exe"
    1⤵
    • Chimera
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.8.0_66\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    8401affed8b638de39ec8b09b93de45a

    SHA1

    cb8abef5f13c85b04ca68fb347c2c9df6322c547

    SHA256

    73e6b5f07d864073da673271f95f59dfe483eb2d5d49c468e2eac33dc356dcf7

    SHA512

    f2dc095064f040d478bd268035e41bfbc7f9336eca82ed22677134b9ea8a02e9fb8b7f43cb2fc00993cc1ab92e5ab1a4d3beca4162737222ab60f973213acb24

  • memory/3484-0-0x0000000074FC0000-0x0000000075571000-memory.dmp

    Filesize

    5.7MB

  • memory/3484-2-0x0000000000F60000-0x0000000000F70000-memory.dmp

    Filesize

    64KB

  • memory/3484-1-0x0000000074FC0000-0x0000000075571000-memory.dmp

    Filesize

    5.7MB

  • memory/3484-3-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/3484-8-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/3484-9-0x0000000000F40000-0x0000000000F5A000-memory.dmp

    Filesize

    104KB

  • memory/3484-10-0x0000000074FC0000-0x0000000075571000-memory.dmp

    Filesize

    5.7MB

  • memory/3484-11-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/3484-12-0x0000000000F40000-0x0000000000F5A000-memory.dmp

    Filesize

    104KB