Analysis
-
max time kernel
120s -
max time network
122s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Edge.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Microsoft Edge.exe
Resource
win10-en-20211014
General
-
Target
Microsoft Edge.exe
-
Size
218KB
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
-
SHA1
8c3df16117b524addb56511f31df703c8ec3c172
-
SHA256
2baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
-
SHA512
d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.txt
chaos
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe family_chaos C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe family_chaos -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Edge.exepid process 1396 Microsoft Edge.exe -
Drops startup file 3 IoCs
Processes:
Microsoft Edge.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READ_ME.txt Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.url Microsoft Edge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
Processes:
Microsoft Edge.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Microsoft Edge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 960 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Microsoft Edge.exepid process 1396 Microsoft Edge.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exepid process 836 Microsoft Edge.exe 1396 Microsoft Edge.exe 1396 Microsoft Edge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exedescription pid process Token: SeDebugPrivilege 836 Microsoft Edge.exe Token: SeDebugPrivilege 1396 Microsoft Edge.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exedescription pid process target process PID 836 wrote to memory of 1396 836 Microsoft Edge.exe Microsoft Edge.exe PID 836 wrote to memory of 1396 836 Microsoft Edge.exe Microsoft Edge.exe PID 836 wrote to memory of 1396 836 Microsoft Edge.exe Microsoft Edge.exe PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe NOTEPAD.EXE PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe NOTEPAD.EXE PID 1396 wrote to memory of 960 1396 Microsoft Edge.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ_ME.txt3⤵
- Opens file in notepad (likely ransom note)
PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
SHA18c3df16117b524addb56511f31df703c8ec3c172
SHA2562baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
SHA512d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
SHA18c3df16117b524addb56511f31df703c8ec3c172
SHA2562baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
SHA512d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
-
MD5
4217b8b83ce3c3f70029a056546f8fd0
SHA1487cdb5733d073a0427418888e8f7070fe782a03
SHA2567d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121
SHA5122a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740