Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Chimera-1....igs.py
windows7-x64
Chimera-1....igs.py
windows10-2004-x64
3Chimera-1....t__.py
windows7-x64
3Chimera-1....t__.py
windows10-2004-x64
3Chimera-1....rol.py
windows7-x64
3Chimera-1....rol.py
windows10-2004-x64
3Chimera-1....rol.py
windows7-x64
3Chimera-1....rol.py
windows10-2004-x64
3Chimera-1....ers.py
windows7-x64
3Chimera-1....ers.py
windows10-2004-x64
3Chimera-1....nds.py
windows7-x64
3Chimera-1....nds.py
windows10-2004-x64
3Chimera-1....ent.py
windows7-x64
3Chimera-1....ent.py
windows10-2004-x64
3Chimera-1....t__.py
windows7-x64
3Chimera-1....t__.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Chimera-1....ule.py
windows7-x64
3Chimera-1....ule.py
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
Chimera-1.4/configs.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Chimera-1.4/configs.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Chimera-1.4/lib/__init__.py
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Chimera-1.4/lib/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Chimera-1.4/lib/camera_control.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Chimera-1.4/lib/camera_control.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Chimera-1.4/lib/filesystem_control.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Chimera-1.4/lib/filesystem_control.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Chimera-1.4/lib/helpers.py
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Chimera-1.4/lib/helpers.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Chimera-1.4/lib/input_commands.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Chimera-1.4/lib/input_commands.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Chimera-1.4/lib/memory_management.py
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
Chimera-1.4/lib/memory_management.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Chimera-1.4/modules/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Chimera-1.4/modules/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Chimera-1.4/modules/camera_module.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Chimera-1.4/modules/camera_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Chimera-1.4/modules/cmd_module.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Chimera-1.4/modules/cmd_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Chimera-1.4/modules/echo_module.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Chimera-1.4/modules/echo_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Chimera-1.4/modules/file_module.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Chimera-1.4/modules/file_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
Chimera-1.4/modules/helpme_module.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Chimera-1.4/modules/helpme_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
Chimera-1.4/modules/hibernate_module.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Chimera-1.4/modules/hibernate_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
Chimera-1.4/modules/launch_module.py
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Chimera-1.4/modules/launch_module.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
Chimera-1.4/modules/lock_module.py
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Chimera-1.4/modules/lock_module.py
Resource
win10v2004-20240221-en
General
-
Target
Chimera-1.4/lib/filesystem_control.py
-
Size
1KB
-
MD5
f5a66c998b3bd837dce2ed5dde863a92
-
SHA1
4eda27b3729b41b8c0316c07051d206c71268012
-
SHA256
44e19922e16ea21013cbc4472e36e98edcd12a274fa661672655198b5cad59e5
-
SHA512
3a1e42142565847959a63886ec2ceefe505d1d451963b807875c1a0ee6f4ab39e4c9b44b5a94125e18bacce84b8b71c0ec0d22e909080411063631caceb06446
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2572 2200 cmd.exe 29 PID 2200 wrote to memory of 2572 2200 cmd.exe 29 PID 2200 wrote to memory of 2572 2200 cmd.exe 29 PID 2572 wrote to memory of 2712 2572 rundll32.exe 30 PID 2572 wrote to memory of 2712 2572 rundll32.exe 30 PID 2572 wrote to memory of 2712 2572 rundll32.exe 30 PID 2572 wrote to memory of 2712 2572 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\lib\filesystem_control.py1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\lib\filesystem_control.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Chimera-1.4\lib\filesystem_control.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551e25c4e6ddae1a393e6b9e7f846bf94
SHA17cf1ef6de1b93200561ab5cea52dce0df0e01a9d
SHA25689d686f903dfd74475e73381d5ff21d38be9f3ba213ace16ab628c2f5192b983
SHA512f0b403f5506db32bdd7cc2d034007547aee4f03b7dd9c687534e8bd372d3e78bd644dac9cdb9871d9077b28788d1402debc78f0bb51884920e72154c528918df