Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2023, 05:19
Behavioral task
behavioral1
Sample
Bad Virus.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Bad Virus.bin.exe
Resource
win10v2004-20230221-en
General
-
Target
Bad Virus.bin.exe
-
Size
23KB
-
MD5
17ed08ee4b730ff390179ecc05589c2d
-
SHA1
993232f694230a2d5f573d819910dc36c4c0a631
-
SHA256
5ab74f0fff69e6c6ddbdbb4bc00262db055a5dde45c60aa7d12f34a8044c0128
-
SHA512
10963cf62d2de567adfd56bfa68c0531243fe387c7f3ae7e01903a56a4309385a7bcdd30d42f71343d719bdee3f7c5fb8e4f60e6a23e277712915afde8e48637
-
SSDEEP
384:T3Mg/bqo2VcxtivpTUc3LTAzkQJKr91CAfb51eq:lqo2YtMpTLbTzYKr9/fbjeq
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
chaos
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1724-54-0x0000000000900000-0x000000000090C000-memory.dmp family_chaos behavioral1/files/0x000b0000000122fe-58.dat family_chaos behavioral1/files/0x000b0000000122fe-59.dat family_chaos behavioral1/memory/1640-60-0x0000000000190000-0x000000000019C000-memory.dmp family_chaos -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CheckpointDebug.raw => C:\Users\Admin\Pictures\CheckpointDebug.raw.bin svchost.exe File renamed C:\Users\Admin\Pictures\CloseTrace.raw => C:\Users\Admin\Pictures\CloseTrace.raw.bin svchost.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 952 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1640 svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1724 Bad Virus.bin.exe 1640 svchost.exe 1640 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 Bad Virus.bin.exe Token: SeDebugPrivilege 1640 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1640 1724 Bad Virus.bin.exe 27 PID 1724 wrote to memory of 1640 1724 Bad Virus.bin.exe 27 PID 1724 wrote to memory of 1640 1724 Bad Virus.bin.exe 27 PID 1640 wrote to memory of 952 1640 svchost.exe 29 PID 1640 wrote to memory of 952 1640 svchost.exe 29 PID 1640 wrote to memory of 952 1640 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bad Virus.bin.exe"C:\Users\Admin\AppData\Local\Temp\Bad Virus.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Modifies extensions of user files
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
964B
MD54217b8b83ce3c3f70029a056546f8fd0
SHA1487cdb5733d073a0427418888e8f7070fe782a03
SHA2567d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121
SHA5122a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740
-
Filesize
23KB
MD517ed08ee4b730ff390179ecc05589c2d
SHA1993232f694230a2d5f573d819910dc36c4c0a631
SHA2565ab74f0fff69e6c6ddbdbb4bc00262db055a5dde45c60aa7d12f34a8044c0128
SHA51210963cf62d2de567adfd56bfa68c0531243fe387c7f3ae7e01903a56a4309385a7bcdd30d42f71343d719bdee3f7c5fb8e4f60e6a23e277712915afde8e48637
-
Filesize
23KB
MD517ed08ee4b730ff390179ecc05589c2d
SHA1993232f694230a2d5f573d819910dc36c4c0a631
SHA2565ab74f0fff69e6c6ddbdbb4bc00262db055a5dde45c60aa7d12f34a8044c0128
SHA51210963cf62d2de567adfd56bfa68c0531243fe387c7f3ae7e01903a56a4309385a7bcdd30d42f71343d719bdee3f7c5fb8e4f60e6a23e277712915afde8e48637
-
Filesize
964B
MD54217b8b83ce3c3f70029a056546f8fd0
SHA1487cdb5733d073a0427418888e8f7070fe782a03
SHA2567d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121
SHA5122a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740