Overview
overview
7Static
static
7Chlorine 2.0.exe
windows10-1703-x64
7source/BitBlt1.exe
windows10-1703-x64
1source/Chlorine.vbs
windows10-1703-x64
6source/IconHell.exe
windows10-1703-x64
1source/Vbs...xe.exe
windows10-1703-x64
7source/Vbs...4).exe
windows10-1703-x64
7source/Vbs...r).exe
windows10-1703-x64
7source/bsod.exe
windows10-1703-x64
1source/mbr.exe
windows10-1703-x64
6source/mousedraw.exe
windows10-1703-x64
1source/msgloop.vbs
windows10-1703-x64
1source/noise.exe
windows10-1703-x64
1source/sussywaves.exe
windows10-1703-x64
1Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/06/2024, 01:57
Behavioral task
behavioral1
Sample
Chlorine 2.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
source/BitBlt1.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
source/Chlorine.vbs
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
source/IconHell.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
source/Vbs_To_Exe/Portable/Vbs_To_Exe.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
source/Vbs_To_Exe/Portable/Vbs_To_Exe_(x64).exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
source/Vbs_To_Exe/Vbs_To_Exe_(Installer).exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
source/bsod.exe
Resource
win10-20240611-en
Behavioral task
behavioral9
Sample
source/mbr.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
source/mousedraw.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
source/msgloop.vbs
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
source/noise.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
source/sussywaves.exe
Resource
win10-20240404-en
General
-
Target
source/Chlorine.vbs
-
Size
5KB
-
MD5
a10d375e013a00dd14a16bfce7b6d2f0
-
SHA1
9c863fddf6a0a5e7b0b2b1cb8268ea1586de5150
-
SHA256
16a59e4fd5b0d27325cbf2deeb34f8f49f3368c562e9a5deb934eb234d89ea05
-
SHA512
6d839b235c9c4ff3021947debb8b73a512c7b8c140ac35a7f49a127446102b84f16fa11e441cc360beea248180de23305527c1de90f3226ddf332e6863c30378
-
SSDEEP
96:Fo7feQCdUFuzxhldtVpdyQJQI1EUgRtCoYkXZ8qw5oHYpw0:9QCdUgxhl3VpdB6I1qrXZ8q2oHYpw0
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings WScript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 644 AUDIODG.EXE Token: SeShutdownPrivilege 2044 bsod.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3108 4108 WScript.exe 73 PID 4108 wrote to memory of 3108 4108 WScript.exe 73 PID 4108 wrote to memory of 3108 4108 WScript.exe 73 PID 4108 wrote to memory of 5108 4108 WScript.exe 74 PID 4108 wrote to memory of 5108 4108 WScript.exe 74 PID 4108 wrote to memory of 1416 4108 WScript.exe 75 PID 4108 wrote to memory of 1416 4108 WScript.exe 75 PID 4108 wrote to memory of 1416 4108 WScript.exe 75 PID 4108 wrote to memory of 4548 4108 WScript.exe 77 PID 4108 wrote to memory of 4548 4108 WScript.exe 77 PID 4108 wrote to memory of 4548 4108 WScript.exe 77 PID 4108 wrote to memory of 648 4108 WScript.exe 78 PID 4108 wrote to memory of 648 4108 WScript.exe 78 PID 4108 wrote to memory of 648 4108 WScript.exe 78 PID 4108 wrote to memory of 3868 4108 WScript.exe 79 PID 4108 wrote to memory of 3868 4108 WScript.exe 79 PID 4108 wrote to memory of 3868 4108 WScript.exe 79 PID 4108 wrote to memory of 4716 4108 WScript.exe 80 PID 4108 wrote to memory of 4716 4108 WScript.exe 80 PID 4108 wrote to memory of 4716 4108 WScript.exe 80 PID 4108 wrote to memory of 2044 4108 WScript.exe 81 PID 4108 wrote to memory of 2044 4108 WScript.exe 81 PID 4108 wrote to memory of 2044 4108 WScript.exe 81
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\source\Chlorine.vbs"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\source\mbr.exe"C:\Users\Admin\AppData\Local\Temp\source\mbr.exe"2⤵
- Writes to the Master Boot Record (MBR)
PID:3108
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\source\msgloop.vbs"2⤵PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\source\noise.exe"C:\Users\Admin\AppData\Local\Temp\source\noise.exe"2⤵PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\source\mousedraw.exe"C:\Users\Admin\AppData\Local\Temp\source\mousedraw.exe"2⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\source\sussywaves.exe"C:\Users\Admin\AppData\Local\Temp\source\sussywaves.exe"2⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\source\BitBlt1.exe"C:\Users\Admin\AppData\Local\Temp\source\BitBlt1.exe"2⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\source\IconHell.exe"C:\Users\Admin\AppData\Local\Temp\source\IconHell.exe"2⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\source\bsod.exe"C:\Users\Admin\AppData\Local\Temp\source\bsod.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:644