Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 22:55
Behavioral task
behavioral1
Sample
ChaosV5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ChaosV5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ChaosV5.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ChaosV5.pyc
Resource
win10v2004-20240412-en
General
-
Target
ChaosV5.pyc
-
Size
36KB
-
MD5
06f994bbf1392782da1bf2b308b5d640
-
SHA1
fdf4f4a3a36e6d6a40c26d2a6b9734360d1fd51a
-
SHA256
cea803e65698e9f750d577535a0a495f559c429f7cde60ceddecffc9ce662c2c
-
SHA512
5eb997ba3586606ac3ff10bc614f7b97f4c98e008031fea38740cdb2396bc86d770c3f6205f54e12dd64a39087c6c58a17686efc7e23daecc98e1a7418e94c8d
-
SSDEEP
768:POUyBQHE5McYcoqY1Yv5q40SHZdsS4eZRTVS1KECcXABWE95e:GUyBQHE5McYcorGuStps
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2608 2308 cmd.exe 29 PID 2308 wrote to memory of 2608 2308 cmd.exe 29 PID 2308 wrote to memory of 2608 2308 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ChaosV5.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ChaosV5.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2608
-