Analysis
-
max time kernel
119s -
max time network
126s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Edge.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Microsoft Edge.exe
Resource
win10-en-20211014
General
-
Target
Microsoft Edge.exe
-
Size
218KB
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
-
SHA1
8c3df16117b524addb56511f31df703c8ec3c172
-
SHA256
2baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
-
SHA512
d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.txt
chaos
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab93-118.dat family_chaos behavioral2/files/0x000500000001ab93-119.dat family_chaos -
Executes dropped EXE 1 IoCs
pid Process 4572 Microsoft Edge.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.url Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READ_ME.txt Microsoft Edge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Links\desktop.ini Microsoft Edge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings Microsoft Edge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 584 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4572 Microsoft Edge.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3476 Microsoft Edge.exe Token: SeDebugPrivilege 4572 Microsoft Edge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4572 3476 Microsoft Edge.exe 69 PID 3476 wrote to memory of 4572 3476 Microsoft Edge.exe 69 PID 4572 wrote to memory of 584 4572 Microsoft Edge.exe 70 PID 4572 wrote to memory of 584 4572 Microsoft Edge.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ_ME.txt3⤵
- Opens file in notepad (likely ransom note)
PID:584
-
-