Overview
overview
3Static
static
1Chimera-1....igs.py
windows7-x64
Chimera-1....igs.py
windows10-2004-x64
3Chimera-1....t__.py
windows7-x64
3Chimera-1....t__.py
windows10-2004-x64
3Chimera-1....rol.py
windows7-x64
3Chimera-1....rol.py
windows10-2004-x64
3Chimera-1....rol.py
windows7-x64
3Chimera-1....rol.py
windows10-2004-x64
3Chimera-1....ers.py
windows7-x64
3Chimera-1....ers.py
windows10-2004-x64
3Chimera-1....nds.py
windows7-x64
3Chimera-1....nds.py
windows10-2004-x64
3Chimera-1....ent.py
windows7-x64
3Chimera-1....ent.py
windows10-2004-x64
3Chimera-1....t__.py
windows7-x64
3Chimera-1....t__.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
Chimera-1.4/configs.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Chimera-1.4/configs.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Chimera-1.4/lib/__init__.py
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Chimera-1.4/lib/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Chimera-1.4/lib/camera_control.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Chimera-1.4/lib/camera_control.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Chimera-1.4/lib/filesystem_control.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Chimera-1.4/lib/filesystem_control.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Chimera-1.4/lib/helpers.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Chimera-1.4/lib/helpers.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Chimera-1.4/lib/input_commands.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Chimera-1.4/lib/input_commands.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Chimera-1.4/lib/memory_management.py
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
Chimera-1.4/lib/memory_management.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Chimera-1.4/modules/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Chimera-1.4/modules/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Chimera-1.4/modules/camera_module.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Chimera-1.4/modules/camera_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Chimera-1.4/modules/cmd_module.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Chimera-1.4/modules/cmd_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Chimera-1.4/modules/echo_module.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Chimera-1.4/modules/echo_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Chimera-1.4/modules/file_module.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Chimera-1.4/modules/file_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
Chimera-1.4/modules/helpme_module.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Chimera-1.4/modules/helpme_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
Chimera-1.4/modules/hibernate_module.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Chimera-1.4/modules/hibernate_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
Chimera-1.4/modules/launch_module.py
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Chimera-1.4/modules/launch_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
Chimera-1.4/modules/lock_module.py
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Chimera-1.4/modules/lock_module.py
Resource
win10v2004-20240221-en
General
-
Target
Chimera-1.4/modules/cmd_module.py
-
Size
371B
-
MD5
131cf3397c0439093aa20b9bfb412b67
-
SHA1
34a1757680ee2586091951748aa02af76f1513aa
-
SHA256
7da58f780b7ae4dc1b97542a683190bc4bfc8231fedf82eff22682f61d404150
-
SHA512
ff01ef3706afd68392a5bf41a0992b83a5047a93ee4efd69675acdc7af122ccc8d0ec02a0f107f56503d011939be45a2131de9a743559384c590929879463c34
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2448 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2448 AcroRd32.exe 2448 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2640 1996 cmd.exe 29 PID 1996 wrote to memory of 2640 1996 cmd.exe 29 PID 1996 wrote to memory of 2640 1996 cmd.exe 29 PID 2640 wrote to memory of 2448 2640 rundll32.exe 30 PID 2640 wrote to memory of 2448 2640 rundll32.exe 30 PID 2640 wrote to memory of 2448 2640 rundll32.exe 30 PID 2640 wrote to memory of 2448 2640 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\modules\cmd_module.py1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\modules\cmd_module.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\modules\cmd_module.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c832084cd02677baff470f79faf174f4
SHA15138ba4c221dfd5bfbeb012060c44bc39ac3db41
SHA256efc94ede84d2d5bafae2cf802fef6769d381f6b714467c009803e6f28fb4caaf
SHA5126d0825ee13c9bb1ef23e0b46b3dbe5cff10f0540a150adcf3e0322d005e4280b555f19da5146eb5130d887ee1a7508181fb6ac38f52ec5232278b856c9e6b3ea