Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Chaes

Chaes

Chaes is a multistage information stealer written in several programming languages that collects login credentials, credit card numbers, and other financial information.Chaes was first observed in 2020, and appears to primarily target victims in Brazil as well as other e-commerce customers in Latin America.[1]

ID: S0631
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 30 June 2021
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Chaes has used HTTP for C2 communications.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Chaes has added persistence via the Registry keysoftware\microsoft\windows\currentversion\run\microsoft windows html help.[1]

EnterpriseT1185Browser Session Hijacking

Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Chaes has usedcmd to execute tasks on the system.[1]

.005Command and Scripting Interpreter:Visual Basic

Chaes has used VBscript to execute malicious code.[1]

.006Command and Scripting Interpreter:Python

Chaes has used Python scripts for execution and the installation of additional files.[1]

.007Command and Scripting Interpreter:JavaScript

Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.[1]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

Chaes can steal login credentials and stored financial information from the browser.[1]

EnterpriseT1132.001Data Encoding:Standard Encoding

Chaes has used Base64 to encode C2 communications.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Chaes has decrypted an AES encrypted binary file to trigger the download of other files.[1]

EnterpriseT1573Encrypted Channel

Chaes has used encryption for its C2 channel.[1]

EnterpriseT1048Exfiltration Over Alternative Protocol

Chaes has exfiltrated its collected data from the infected machine to the C2, sometimes using the MIME protocol.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

Chaes has used search order hijacking to load a malicious DLL.[1]

EnterpriseT1105Ingress Tool Transfer

Chaes can download additional files onto an infected machine.[1]

EnterpriseT1056Input Capture

Chaes has a module to perform any API hooking it desires.[1]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

Chaes has used an unsigned, crafted DLL module namedhha.dll that was designed to look like a legitimate 32-bit Windows DLL.[1]

EnterpriseT1112Modify Registry

Chaes can modify Registry values to stored information and establish persistence.[1]

EnterpriseT1106Native API

Chaes used theCreateFileW() API function with read permissions to access downloaded payloads.[1]

EnterpriseT1027.011Obfuscated Files or Information:Fileless Storage

Some versions ofChaes stored its instructions (otherwise in ainstructions.ini file) in the Registry.[1]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.[1]

EnterpriseT1113Screen Capture

Chaes can capture screenshots of the infected machine.[1]

EnterpriseT1539Steal Web Session Cookie

Chaes has used a script that extracts the web session cookie and sends it to the C2 server.[1]

EnterpriseT1218.004System Binary Proxy Execution:InstallUtil

Chaes has used Installutill to download content.[1]

.007System Binary Proxy Execution:Msiexec

Chaes has used .MSI files as an initial way to start the infection chain.[1]

EnterpriseT1082System Information Discovery

Chaes has collected system information, including the machine name and OS version.[1]

EnterpriseT1033System Owner/User Discovery

Chaes has collected the username and UID from the infected machine.[1]

EnterpriseT1221Template Injection

Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.[1]

EnterpriseT1204.002User Execution:Malicious File

Chaes requires the user to click on the malicious Word document to execute the next part of the attack.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp