Analysis
-
max time kernel
120s -
max time network
122s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Edge.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Microsoft Edge.exe
Resource
win10-en-20211014
General
-
Target
Microsoft Edge.exe
-
Size
218KB
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
-
SHA1
8c3df16117b524addb56511f31df703c8ec3c172
-
SHA256
2baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
-
SHA512
d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.txt
chaos
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral1/files/0x0006000000012644-58.dat family_chaos behavioral1/files/0x0006000000012644-59.dat family_chaos -
Executes dropped EXE 1 IoCs
pid Process 1396 Microsoft Edge.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READ_ME.txt Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.url Microsoft Edge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Microsoft Edge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 960 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1396 Microsoft Edge.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 836 Microsoft Edge.exe 1396 Microsoft Edge.exe 1396 Microsoft Edge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 836 Microsoft Edge.exe Token: SeDebugPrivilege 1396 Microsoft Edge.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 836 wrote to memory of 1396 836 Microsoft Edge.exe 28 PID 836 wrote to memory of 1396 836 Microsoft Edge.exe 28 PID 836 wrote to memory of 1396 836 Microsoft Edge.exe 28 PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe 30 PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe 30 PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ_ME.txt3⤵
- Opens file in notepad (likely ransom note)
PID:960
-
-