Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 14:20

General

  • Target

    f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f.exe

  • Size

    263KB

  • MD5

    9d016244b7f58fa5e974ef5f6e1ae54e

  • SHA1

    001bc943725ab768f8b8ecb2c9d3ae328f33c78b

  • SHA256

    f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f

  • SHA512

    292c222ca38e12c933769e128c9682a23719204214c1aca7e585eb1ef6c8c8b2090514298df16fe8b233482d8a7dedddd402c7db1d90aae8ea67915a2ff422d7

  • SSDEEP

    6144:iBr9fEjPswpzDFi2XFF47RpYlvP8kq/ac6:DjPskM2Xv47RGlvy/ac6

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 33 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f.exe
    "C:\Users\Admin\AppData\Local\Temp\f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Checks computer location settings
      • Drops startup file
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:536
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3760
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3852
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4268
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:532
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:3200
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\ramp3.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:5096
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4092
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2132
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:4248
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3160

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\ramp3.txt

      Filesize

      591B

      MD5

      4a6443639a724a288bda752871e355b5

      SHA1

      456ba0a8c5ad860c5300452a32bf96ca86a472b9

      SHA256

      5a151e52d267134f76813bc5dd523da662f8925f021a2de6b9cc63f9b5d40eb6

      SHA512

      875d09192c1832c5cb49e4f04e4ce0ee18bdee58fb4adc503d95a5dfff5de6b83688783e4ebd23058ddfddb77893b1adf3acf1e5675b2e95c3349d9a6a4d95ca

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      263KB

      MD5

      9d016244b7f58fa5e974ef5f6e1ae54e

      SHA1

      001bc943725ab768f8b8ecb2c9d3ae328f33c78b

      SHA256

      f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f

      SHA512

      292c222ca38e12c933769e128c9682a23719204214c1aca7e585eb1ef6c8c8b2090514298df16fe8b233482d8a7dedddd402c7db1d90aae8ea67915a2ff422d7

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      263KB

      MD5

      9d016244b7f58fa5e974ef5f6e1ae54e

      SHA1

      001bc943725ab768f8b8ecb2c9d3ae328f33c78b

      SHA256

      f871efc0cdf5446908e436de9ed821ff0ec5e217c50c16e69e3d0e83f6257f0f

      SHA512

      292c222ca38e12c933769e128c9682a23719204214c1aca7e585eb1ef6c8c8b2090514298df16fe8b233482d8a7dedddd402c7db1d90aae8ea67915a2ff422d7

    • memory/4460-139-0x00007FFD0AAC0000-0x00007FFD0B581000-memory.dmp

      Filesize

      10.8MB

    • memory/4460-138-0x00007FFD0AAC0000-0x00007FFD0B581000-memory.dmp

      Filesize

      10.8MB

    • memory/4732-132-0x0000000000CB0000-0x0000000000CF8000-memory.dmp

      Filesize

      288KB

    • memory/4732-137-0x00007FFD0AAC0000-0x00007FFD0B581000-memory.dmp

      Filesize

      10.8MB

    • memory/4732-133-0x00007FFD0AAC0000-0x00007FFD0B581000-memory.dmp

      Filesize

      10.8MB