Analysis
-
max time kernel
119s -
max time network
126s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Edge.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Microsoft Edge.exe
Resource
win10-en-20211014
General
-
Target
Microsoft Edge.exe
-
Size
218KB
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
-
SHA1
8c3df16117b524addb56511f31df703c8ec3c172
-
SHA256
2baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
-
SHA512
d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
Malware Config
Extracted
C:\Users\Admin\Desktop\READ_ME.txt
chaos
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000500000001ab93-118.dat family_chaos behavioral2/files/0x000500000001ab93-119.dat family_chaos -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Edge.exepid Process 4572 Microsoft Edge.exe -
Drops startup file 3 IoCs
Processes:
Microsoft Edge.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.url Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Microsoft Edge.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\READ_ME.txt Microsoft Edge.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
Processes:
Microsoft Edge.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Music\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Public\Videos\desktop.ini Microsoft Edge.exe File opened for modification C:\Users\Admin\Links\desktop.ini Microsoft Edge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Microsoft Edge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings Microsoft Edge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 584 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Microsoft Edge.exepid Process 4572 Microsoft Edge.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exepid Process 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 3476 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe 4572 Microsoft Edge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exedescription pid Process Token: SeDebugPrivilege 3476 Microsoft Edge.exe Token: SeDebugPrivilege 4572 Microsoft Edge.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Microsoft Edge.exeMicrosoft Edge.exedescription pid Process procid_target PID 3476 wrote to memory of 4572 3476 Microsoft Edge.exe 69 PID 3476 wrote to memory of 4572 3476 Microsoft Edge.exe 69 PID 4572 wrote to memory of 584 4572 Microsoft Edge.exe 70 PID 4572 wrote to memory of 584 4572 Microsoft Edge.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Edge.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"C:\Users\Admin\AppData\Roaming\Microsoft Edge.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ_ME.txt3⤵
- Opens file in notepad (likely ransom note)
PID:584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d78293ab15ad25b5d6e8740fe5fd3872
SHA151b70837f90f2bff910daee706e6be8d62a3550e
SHA2564d64746f8d24ec321b1a6c3a743946b66d8317cbc6bac6fed675a4bf6fa181f3
SHA5121127435ef462f52677e1ef4d3b8cfdf9f5d95c832b4c9f41526b7448d315f25d96d3d5454108569b76d66d78d07ea5ba4a1ba8baee108e8c1b452ba19cc04925
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
SHA18c3df16117b524addb56511f31df703c8ec3c172
SHA2562baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
SHA512d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
-
MD5
c6f844c748dfaa9db24483c45fcfb31f
SHA18c3df16117b524addb56511f31df703c8ec3c172
SHA2562baa450fe71d29480b0dcf27977c156a7b3cb37f29d27f6e3fd49e2dea1abebe
SHA512d5990baeded8878005f5beb16d386454658bd29effa9657a5cc4f20056816421e01d335c22ef4bfb90f8157262dde76226ac194d2a36fe1c8f206cbcf8c38dfc
-
MD5
4217b8b83ce3c3f70029a056546f8fd0
SHA1487cdb5733d073a0427418888e8f7070fe782a03
SHA2567d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121
SHA5122a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740