Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 02:43

General

  • Target

    Chaoslauncher.exe

  • Size

    1.2MB

  • MD5

    1fe86f8e78d67a429516609d7b9db238

  • SHA1

    56da3cb44ec262d83fe1089073753e25ff712898

  • SHA256

    9300b87452afc3599aa9e5c599388c976789b4006987a89ffb85164e971b622c

  • SHA512

    f2c8b9a58061cd080219afe3e912e141825e0a435270244884f26c1da15f0832530b7f2954030ff434d35b156e3a3343d4f84def87c7a75d3ad8b8f251984155

  • SSDEEP

    24576:iC76ClyNFSzvUdNBWmQSGi4lm3kLzWCuak:jlgbGigmgJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chaoslauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\Chaoslauncher.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Chaoslauncher.log

    Filesize

    489B

    MD5

    9ca3180a0c617779cb61eb4396eb8558

    SHA1

    2e9b66330f32cb89f9279a747b7001130adb5fdb

    SHA256

    55d9645f664513cf9be8857609187ae41ce9019ef61f63c548d4b66f0f24f8c1

    SHA512

    f61d42f58f32cb9823224ee601f011c75313ceace575212a6476acc6fd00c767372dc4807cc7204682d5518760dc403c6a28353dcb0da91c43aeee0fab181879

  • memory/3000-41-0x0000000003CD0000-0x0000000003D4E000-memory.dmp

    Filesize

    504KB

  • memory/3000-52-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

    Filesize

    4KB

  • memory/3000-11-0x00000000033B0000-0x000000000345F000-memory.dmp

    Filesize

    700KB

  • memory/3000-26-0x0000000000C40000-0x0000000000C57000-memory.dmp

    Filesize

    92KB

  • memory/3000-29-0x0000000002180000-0x0000000002197000-memory.dmp

    Filesize

    92KB

  • memory/3000-32-0x00000000031B0000-0x0000000003264000-memory.dmp

    Filesize

    720KB

  • memory/3000-33-0x0000000003C10000-0x0000000003C89000-memory.dmp

    Filesize

    484KB

  • memory/3000-40-0x00000000035F0000-0x000000000365C000-memory.dmp

    Filesize

    432KB

  • memory/3000-42-0x00000000037B0000-0x00000000037D3000-memory.dmp

    Filesize

    140KB

  • memory/3000-53-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/3000-13-0x00000000031B0000-0x0000000003264000-memory.dmp

    Filesize

    720KB

  • memory/3000-50-0x0000000003800000-0x0000000003808000-memory.dmp

    Filesize

    32KB

  • memory/3000-1-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3000-59-0x0000000003C10000-0x0000000003C89000-memory.dmp

    Filesize

    484KB

  • memory/3000-61-0x0000000003CD0000-0x0000000003D4E000-memory.dmp

    Filesize

    504KB

  • memory/3000-58-0x00000000035F0000-0x000000000365C000-memory.dmp

    Filesize

    432KB

  • memory/3000-55-0x0000000000400000-0x000000000053E000-memory.dmp

    Filesize

    1.2MB

  • memory/3000-57-0x00000000033B0000-0x000000000345F000-memory.dmp

    Filesize

    700KB

  • memory/3000-63-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3000-76-0x0000000003C10000-0x0000000003C89000-memory.dmp

    Filesize

    484KB

  • memory/3000-78-0x0000000003CD0000-0x0000000003D4E000-memory.dmp

    Filesize

    504KB

  • memory/3000-77-0x00000000037B0000-0x00000000037D3000-memory.dmp

    Filesize

    140KB