Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 01:40
Behavioral task
behavioral1
Sample
942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe
Resource
win10v2004-20220812-en
General
-
Target
942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe
-
Size
23KB
-
MD5
ad64cd38dc59c90ca8cffc512cf4450b
-
SHA1
b45af5d72ac60c552d1f3eed07508c4a6fbade5c
-
SHA256
942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd
-
SHA512
55eca87344e24848e004c5a5255e7275314f3f5ca2d588e9900779977dbac3231eaa7e61ae303cde2be24084ec7447aa84276d5b00abe15cd10f5438b0813be3
-
SSDEEP
384:n3Mg/bqo2bKKzM76pYDKF+98cJ3+r91CjEZb56e9t:xqo2nzRpYDKN03+r9uEZbgen
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1048-54-0x0000000000D30000-0x0000000000D3C000-memory.dmp family_chaos behavioral1/files/0x000500000000b2d2-56.dat family_chaos behavioral1/files/0x000500000000b2d2-57.dat family_chaos behavioral1/memory/2008-58-0x0000000000350000-0x000000000035C000-memory.dmp family_chaos -
Executes dropped EXE 1 IoCs
pid Process 2008 coincrypter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1372 2008 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1048 942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe 2008 coincrypter.exe 2008 coincrypter.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1048 942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe Token: SeDebugPrivilege 2008 coincrypter.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2008 1048 942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe 27 PID 1048 wrote to memory of 2008 1048 942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe 27 PID 1048 wrote to memory of 2008 1048 942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe 27 PID 2008 wrote to memory of 1372 2008 coincrypter.exe 28 PID 2008 wrote to memory of 1372 2008 coincrypter.exe 28 PID 2008 wrote to memory of 1372 2008 coincrypter.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe"C:\Users\Admin\AppData\Local\Temp\942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\coincrypter.exe"C:\Users\Admin\AppData\Roaming\coincrypter.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2008 -s 5683⤵
- Program crash
PID:1372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5ad64cd38dc59c90ca8cffc512cf4450b
SHA1b45af5d72ac60c552d1f3eed07508c4a6fbade5c
SHA256942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd
SHA51255eca87344e24848e004c5a5255e7275314f3f5ca2d588e9900779977dbac3231eaa7e61ae303cde2be24084ec7447aa84276d5b00abe15cd10f5438b0813be3
-
Filesize
23KB
MD5ad64cd38dc59c90ca8cffc512cf4450b
SHA1b45af5d72ac60c552d1f3eed07508c4a6fbade5c
SHA256942a5ce563cd29c9a65cbf9ede722f2919de1a8391c12313be2c2606cb3503dd
SHA51255eca87344e24848e004c5a5255e7275314f3f5ca2d588e9900779977dbac3231eaa7e61ae303cde2be24084ec7447aa84276d5b00abe15cd10f5438b0813be3