Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. ChChes

ChChes

ChChes is a Trojan that appears to be used exclusively bymenuPass. It was used to target Japanese organizations in 2016. Its lack of persistence methods suggests it may be intended as a first-stage tool.[1][2][3]

ID: S0144
Associated Software: Scorpion, HAYMAKER
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 17 November 2024

Associated Software Descriptions

NameDescription
Scorpion

[3]

HAYMAKER

Based on similarities in reported malware behavior and open source reporting, it is assessed that the malware named HAYMAKER by FireEye is likely the same as the malware ChChes.[4][5]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header.[1][2]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

ChChes establishes persistence by adding a Registry Run key.[3]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

ChChes steals credentials stored inside Internet Explorer.[3]

EnterpriseT1132.001Data Encoding:Standard Encoding

ChChes can encode C2 data with a custom technique that utilizes Base64.[1][2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

ChChes can encrypt C2 traffic with AES or RC4.[1][2]

EnterpriseT1083File and Directory Discovery

ChChes collects the victim's %TEMP% directory path and version of Internet Explorer.[4]

EnterpriseT1562.001Impair Defenses:Disable or Modify Tools

ChChes can alter the victim's proxy configuration.[3]

EnterpriseT1105Ingress Tool Transfer

ChChes is capable of downloading files, including additional modules.[1][2][4]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe).[3]

EnterpriseT1057Process Discovery

ChChes collects its process identifier (PID) on the victim.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked.[1][2][3]

EnterpriseT1082System Information Discovery

ChChes collects the victim hostname, window resolution, and Microsoft Windows version.[1][3]

Groups That Use This Software

IDNameReferences
G0045menuPass

[3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp