Chaes

Chaes is a multistage information stealer written in several programming languages that collects login credentials, credit card numbers, and other financial information. Chaes was first observed in 2020, and appears to primarily target victims in Brazil as well as other e-commerce customers in Latin America.[1]

ID: S0631
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 30 June 2021
Last Modified: 24 March 2023

Techniques Used

Domain ID Name Use
Enterprise T1555 .003 从密码存储中获取凭证: Credentials from Web Browsers

Chaes can steal login credentials and stored financial information from the browser.[1]

Enterprise T1036 .005 伪装: Match Legitimate Name or Location

Chaes has used an unsigned, crafted DLL module named hha.dll that was designed to look like a legitimate 32-bit Windows DLL.[1]

Enterprise T1112 修改注册表

Chaes can modify Registry values to stored information and establish persistence.[1]

Enterprise T1573 加密通道

Chaes has used encryption for its C2 channel.[1]

Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

Chaes has used search order hijacking to load a malicious DLL.[1]

Enterprise T1140 反混淆/解码文件或信息

Chaes has decrypted an AES encrypted binary file to trigger the download of other files.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Chaes has used cmd to execute tasks on the system.[1]

.005 命令与脚本解释器: Visual Basic

Chaes has used VBscript to execute malicious code.[1]

.006 命令与脚本解释器: Python

Chaes has used Python scripts for execution and the installation of additional files.[1]

.007 命令与脚本解释器: JavaScript

Chaes has used JavaScript and Node.Js information stealer script that exfiltrates data using the node process.[1]

Enterprise T1113 屏幕捕获

Chaes can capture screenshots of the infected machine.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

Chaes has used HTTP for C2 communications.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

Chaes has used Base64 to encode C2 communications.[1]

Enterprise T1048 替代协议渗出

Chaes has exfiltrated its collected data from the infected machine to the C2, sometimes using the MIME protocol.[1]

Enterprise T1106 本机API

Chaes used the CreateFileW() API function with read permissions to access downloaded payloads.[1]

Enterprise T1221 模板注入

Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.[1]

Enterprise T1185 浏览器会话劫持

Chaes has used the Puppeteer module to hook and monitor the Chrome web browser to collect user information from infected hosts.[1]

Enterprise T1027 .011 混淆文件或信息: Fileless Storage

Some versions of Chaes stored its instructions (otherwise in a instructions.ini file) in the Registry.[1]

Enterprise T1204 .002 用户执行: Malicious File

Chaes requires the user to click on the malicious Word document to execute the next part of the attack.[1]

Enterprise T1539 窃取Web会话Cookie

Chaes has used a script that extracts the web session cookie and sends it to the C2 server.[1]

Enterprise T1218 .004 系统二进制代理执行: InstallUtil

Chaes has used Installutill to download content.[1]

.007 系统二进制代理执行: Msiexec

Chaes has used .MSI files as an initial way to start the infection chain.[1]

Enterprise T1082 系统信息发现

Chaes has collected system information, including the machine name and OS version.[1]

Enterprise T1033 系统所有者/用户发现

Chaes has collected the username and UID from the infected machine.[1]

Enterprise T1105 输入工具传输

Chaes can download additional files onto an infected machine.[1]

Enterprise T1056 输入捕获

Chaes has a module to perform any API hooking it desires.[1]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Chaes has been delivered by sending victims a phishing email containing a malicious .docx file.[1]

References