Resubmissions
21-08-2024 16:23
240821-tvvaqssbrl 1021-08-2024 15:52
240821-ta3rda1blk 1022-01-2022 14:10
220122-rgn6fsbfgr 10Analysis
-
max time kernel
361s -
max time network
361s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-01-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
666 virus.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
666 virus.exe
Resource
win10-en-20211208
General
-
Target
666 virus.exe
-
Size
517KB
-
MD5
df0edf8b66d6a09c96802357d088d31b
-
SHA1
4018b609ef6e77c63c4028a12ca66051379b0633
-
SHA256
3bd7ba1da919719a36e943d1c84a3b976a57d7f4d279b3e81f821f2a5a2e7c40
-
SHA512
ee67b4e8465118b70820c7048620e82799c447d80f5d0dc97162c94ad7ce26ced0f273d6f18601be8cbf8340066755cff131563d4333bbc7258885addbf436db
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1332-55-0x0000000000ED0000-0x0000000000F56000-memory.dmp family_chaos behavioral1/files/0x00070000000132df-56.dat family_chaos behavioral1/files/0x00070000000132df-57.dat family_chaos behavioral1/memory/1560-58-0x00000000008D0000-0x0000000000956000-memory.dmp family_chaos -
Executes dropped EXE 1 IoCs
pid Process 1560 svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gabpkjpaj.jpg" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\Wallpaper.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1560 svchost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1332 666 virus.exe 1332 666 virus.exe 1560 svchost.exe 1560 svchost.exe 1560 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 852 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 666 virus.exe Token: SeDebugPrivilege 1560 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 852 AcroRd32.exe 852 AcroRd32.exe 852 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1560 1332 666 virus.exe 27 PID 1332 wrote to memory of 1560 1332 666 virus.exe 27 PID 1332 wrote to memory of 1560 1332 666 virus.exe 27 PID 1560 wrote to memory of 1480 1560 svchost.exe 28 PID 1560 wrote to memory of 1480 1560 svchost.exe 28 PID 1560 wrote to memory of 1480 1560 svchost.exe 28 PID 1480 wrote to memory of 852 1480 rundll32.exe 29 PID 1480 wrote to memory of 852 1480 rundll32.exe 29 PID 1480 wrote to memory of 852 1480 rundll32.exe 29 PID 1480 wrote to memory of 852 1480 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\666 virus.exe"C:\Users\Admin\AppData\Local\Temp\666 virus.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\6663⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\666"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:852
-
-
-