Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2023, 16:49

General

  • Target

    333333.exe

  • Size

    29KB

  • MD5

    df47134780d2ae126fec89f9f246d0e7

  • SHA1

    25806ed7b5ba0284d1ac6858b0f49db39f834b16

  • SHA256

    3f8db4913ef08a02254be20bd04543b55be72cb97f5de3cfd1d773c140abed2a

  • SHA512

    388e220da35f134274bfbc68acb675eab70987fe422e9aa4d5cb581ac6db42a6695142f9d8e59edb12072dfce91c8b3183b360ab9b0669ab1678292e4465a98a

  • SSDEEP

    384:s0JORJcf3Q3iPdxJODbzxqXIoyOVs91J4SYUcS+arWS:0JUJFxcX1q4t93bcGv

Malware Config

Extracted

Path

C:\Users\Admin\Restore-your-files.txt

Ransom Note
## All of your files have been encrypted ## All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [ [email protected] ] - [ [email protected] ] - You have to pay for decryption in Bitcoin. - The price depends on how fast you write to us. - After payment we will send you the decryption tool that will decrypt all your files. - Write ID in the title of your email | ID? = ( NameFile.enc[Your_ID] ) ------------------------------------------------------------------------------------ ## Free decryption as guarantee ## Before paying you can send us up to 1 file for free decryption. The total size of file must be less than 1 Mb (non archived), and file should not contain valuable information. (databases, backups, large excel sheets, etc.) ------------------------------------------------------------------------------------ ## Check link below if we didn't respond ## [ rebrand.ly/N-Emails ] ------------------------------------------------------------------------------------ ## Attention! ## Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 4 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\333333.exe
    "C:\Users\Admin\AppData\Local\Temp\333333.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Modifies extensions of user files
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:1104
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3476
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4260
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3080
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:4756
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Restore-your-files.txt
        3⤵
          PID:216
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4996
    • C:\Windows\system32\wbengine.exe
      "C:\Windows\system32\wbengine.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3392
    • C:\Windows\System32\vdsldr.exe
      C:\Windows\System32\vdsldr.exe -Embedding
      1⤵
        PID:1760
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:2128
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Restore-your-files.txt
        1⤵
          PID:1816

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\333333.exe.log

          Filesize

          226B

          MD5

          28d7fcc2b910da5e67ebb99451a5f598

          SHA1

          a5bf77a53eda1208f4f37d09d82da0b9915a6747

          SHA256

          2391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c

          SHA512

          2d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6

        • C:\Users\Admin\AppData\Roaming\Restore-your-files.txt

          Filesize

          1KB

          MD5

          014e33df55d01c434ac4a65ed3dc939b

          SHA1

          b96fd45a81947b091e70d0bebd7f32959a6f3fbc

          SHA256

          bb8f76eae64024ecc8cb1d09db2affc6c56f808d82e0060241f8cfda803f0668

          SHA512

          e8a38fc09d31c3c6467e5b9ff0c9ef8f568a9dfdd6e7b8dd8aaaddd32a5e156a463ec74a4e9dcf17e8bcb3aa12778e2ed960aca963650699dbce124f4d3346bc

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          29KB

          MD5

          df47134780d2ae126fec89f9f246d0e7

          SHA1

          25806ed7b5ba0284d1ac6858b0f49db39f834b16

          SHA256

          3f8db4913ef08a02254be20bd04543b55be72cb97f5de3cfd1d773c140abed2a

          SHA512

          388e220da35f134274bfbc68acb675eab70987fe422e9aa4d5cb581ac6db42a6695142f9d8e59edb12072dfce91c8b3183b360ab9b0669ab1678292e4465a98a

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          29KB

          MD5

          df47134780d2ae126fec89f9f246d0e7

          SHA1

          25806ed7b5ba0284d1ac6858b0f49db39f834b16

          SHA256

          3f8db4913ef08a02254be20bd04543b55be72cb97f5de3cfd1d773c140abed2a

          SHA512

          388e220da35f134274bfbc68acb675eab70987fe422e9aa4d5cb581ac6db42a6695142f9d8e59edb12072dfce91c8b3183b360ab9b0669ab1678292e4465a98a

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          29KB

          MD5

          df47134780d2ae126fec89f9f246d0e7

          SHA1

          25806ed7b5ba0284d1ac6858b0f49db39f834b16

          SHA256

          3f8db4913ef08a02254be20bd04543b55be72cb97f5de3cfd1d773c140abed2a

          SHA512

          388e220da35f134274bfbc68acb675eab70987fe422e9aa4d5cb581ac6db42a6695142f9d8e59edb12072dfce91c8b3183b360ab9b0669ab1678292e4465a98a

        • C:\Users\Admin\Desktop\Restore-your-files.txt

          Filesize

          1KB

          MD5

          014e33df55d01c434ac4a65ed3dc939b

          SHA1

          b96fd45a81947b091e70d0bebd7f32959a6f3fbc

          SHA256

          bb8f76eae64024ecc8cb1d09db2affc6c56f808d82e0060241f8cfda803f0668

          SHA512

          e8a38fc09d31c3c6467e5b9ff0c9ef8f568a9dfdd6e7b8dd8aaaddd32a5e156a463ec74a4e9dcf17e8bcb3aa12778e2ed960aca963650699dbce124f4d3346bc

        • C:\Users\Admin\Restore-your-files.txt

          Filesize

          1KB

          MD5

          014e33df55d01c434ac4a65ed3dc939b

          SHA1

          b96fd45a81947b091e70d0bebd7f32959a6f3fbc

          SHA256

          bb8f76eae64024ecc8cb1d09db2affc6c56f808d82e0060241f8cfda803f0668

          SHA512

          e8a38fc09d31c3c6467e5b9ff0c9ef8f568a9dfdd6e7b8dd8aaaddd32a5e156a463ec74a4e9dcf17e8bcb3aa12778e2ed960aca963650699dbce124f4d3346bc

        • C:\Users\desktop.ini

          Filesize

          1B

          MD5

          d1457b72c3fb323a2671125aef3eab5d

          SHA1

          5bab61eb53176449e25c2c82f172b82cb13ffb9d

          SHA256

          8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

          SHA512

          ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

        • memory/3304-133-0x0000000000680000-0x000000000068E000-memory.dmp

          Filesize

          56KB