Resubmissions
21-08-2024 16:23
240821-tvvaqssbrl 1021-08-2024 15:52
240821-ta3rda1blk 1022-01-2022 14:10
220122-rgn6fsbfgr 10Analysis
-
max time kernel
307s -
max time network
360s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
666 virus.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
666 virus.exe
Resource
win10-en-20211208
General
-
Target
666 virus.exe
-
Size
517KB
-
MD5
df0edf8b66d6a09c96802357d088d31b
-
SHA1
4018b609ef6e77c63c4028a12ca66051379b0633
-
SHA256
3bd7ba1da919719a36e943d1c84a3b976a57d7f4d279b3e81f821f2a5a2e7c40
-
SHA512
ee67b4e8465118b70820c7048620e82799c447d80f5d0dc97162c94ad7ce26ced0f273d6f18601be8cbf8340066755cff131563d4333bbc7258885addbf436db
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
resource yara_rule behavioral2/memory/2368-115-0x00000000008F0000-0x0000000000976000-memory.dmp family_chaos behavioral2/files/0x000500000001ab32-117.dat family_chaos behavioral2/files/0x000500000001ab32-116.dat family_chaos -
Executes dropped EXE 1 IoCs
pid Process 3256 svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wn8gptif0.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 svchost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 2368 666 virus.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe 3256 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2368 666 virus.exe Token: SeDebugPrivilege 3256 svchost.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe 1320 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3256 2368 666 virus.exe 68 PID 2368 wrote to memory of 3256 2368 666 virus.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\666 virus.exe"C:\Users\Admin\AppData\Local\Temp\666 virus.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1320
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:776