Overview
overview
9Static
static
7Chaos_V2_FIXED.zip
windows7-x64
1Chaos_V2_FIXED.zip
windows10-2004-x64
1Chaos.exe
windows7-x64
9Chaos.exe
windows10-2004-x64
9fpsunlocker.exe
windows7-x64
1fpsunlocker.exe
windows10-2004-x64
1ps.py
windows7-x64
3ps.py
windows10-2004-x64
3pssuspend.exe
windows7-x64
1pssuspend.exe
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 20:29
Behavioral task
behavioral1
Sample
Chaos_V2_FIXED.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Chaos_V2_FIXED.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Chaos.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Chaos.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
fpsunlocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
fpsunlocker.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
ps.py
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
ps.py
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
pssuspend.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
pssuspend.exe
Resource
win10v2004-20240412-en
General
-
Target
Chaos.exe
-
Size
14.1MB
-
MD5
0f2af0b53a994fd35b805fc145d75d7f
-
SHA1
605eaa911754fa8f52af25d292b7230bb5cde454
-
SHA256
8468e629d2bd9b14889e565066bcaf369b53738eb01d05714e99bb16c59d0c07
-
SHA512
448ab9b91f082050b290b4c21be98ed3c89697f501cc4e7e33686fff9b75ab6ca48900b947d1da5337acb30f554beb96b95ef020e6157101d17eca2879a72b9c
-
SSDEEP
393216:jazOUkLXiKcjFVA87ODedSSCnomX/+MX36fqc4GXRF:6AKFVT7dSSTOPXUqcB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Chaos.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Chaos.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Chaos.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Chaos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Chaos.exe -
Executes dropped EXE 1 IoCs
Processes:
Chaos.exepid process 2576 Chaos.exe -
Loads dropped DLL 2 IoCs
Processes:
Chaos.exeChaos.exepid process 1960 Chaos.exe 2576 Chaos.exe -
Processes:
resource yara_rule behavioral3/memory/1960-1-0x000000013F4F0000-0x00000001408DB000-memory.dmp themida behavioral3/memory/1960-2-0x000000013F4F0000-0x00000001408DB000-memory.dmp themida behavioral3/memory/1960-3-0x000000013F4F0000-0x00000001408DB000-memory.dmp themida behavioral3/memory/1960-63-0x000000013F4F0000-0x00000001408DB000-memory.dmp themida -
Processes:
Chaos.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Chaos.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Chaos.exepid process 1960 Chaos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Chaos.exedescription pid process target process PID 1960 wrote to memory of 2576 1960 Chaos.exe Chaos.exe PID 1960 wrote to memory of 2576 1960 Chaos.exe Chaos.exe PID 1960 wrote to memory of 2576 1960 Chaos.exe Chaos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Chaos.exe"C:\Users\Admin\AppData\Local\Temp\Chaos.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\onefile_1960_133580322569534000\Chaos.exe"C:\Users\Admin\AppData\Local\Temp\Chaos.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.9MB
MD53e46741808811d8f1c8207e6e84bbdfa
SHA1c866be7bdd05ee858562c2689c2c653040faf546
SHA256a16b7f0b39f178f1bc66ad6a103265bd5f283b0484ae137f3de035b808e1c51d
SHA5124b224768992170399b5e442c724460ac67d5f2758b2add7329b79b65be22e414361eb92e3ebe0dcb1b1dcd0e80547688eab67bf36e0779a663191c0189663a30
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b