Overview
overview
10Static
static
10189ca1951e...df.exe
windows7-x64
10189ca1951e...df.exe
windows10-2004-x64
1037ca1cfa1f...60.exe
windows7-x64
1037ca1cfa1f...60.exe
windows10-2004-x64
1037e3ba3283...c3.elf
debian-9-armhf
13898dfa5cb...ba.exe
windows7-x64
103898dfa5cb...ba.exe
windows10-2004-x64
103e488cd6f6...e9.exe
windows7-x64
103e488cd6f6...e9.exe
windows10-2004-x64
10505fe3cf69...cb.exe
windows7-x64
10505fe3cf69...cb.exe
windows10-2004-x64
106543c547b8...84.exe
windows7-x64
16543c547b8...84.exe
windows10-2004-x64
10911bb31927...e4.exe
windows7-x64
10911bb31927...e4.exe
windows10-2004-x64
10913aec7dc7...60.exe
windows7-x64
10913aec7dc7...60.exe
windows10-2004-x64
10NEAS.arm7elf_JC.elf
debian-9-armhf
1a23543464a...48.exe
windows7-x64
10a23543464a...48.exe
windows10-2004-x64
10ad21aff38e...59.exe
windows7-x64
1ad21aff38e...59.exe
windows10-2004-x64
10ba5ce65d72...ff.exe
windows7-x64
10ba5ce65d72...ff.exe
windows10-2004-x64
10ca1af61fd2...7f.elf
debian-9-mipsel
9cad291a2df...eb.exe
windows7-x64
10cad291a2df...eb.exe
windows10-2004-x64
10da8e7392c3...fb.exe
windows7-x64
10da8e7392c3...fb.exe
windows10-2004-x64
10e3a0367cf2...02.exe
windows7-x64
10e3a0367cf2...02.exe
windows10-2004-x64
10f8ac9d00a1...1b.exe
windows7-x64
10Analysis
-
max time kernel
155s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 08:33
Behavioral task
behavioral1
Sample
189ca1951e90f92454d9e6f451847f17d5d3e85639e474147d9d63ec529189df.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
189ca1951e90f92454d9e6f451847f17d5d3e85639e474147d9d63ec529189df.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
37e3ba3283cd2b6f56990318a0861f92f76aac467a79df61b72878a493c476c3.elf
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral6
Sample
3898dfa5cb6bbc6d6c48c202d31333d3b214d0f2ac7c4396eb54d6ed09bf24ba.exe
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
3898dfa5cb6bbc6d6c48c202d31333d3b214d0f2ac7c4396eb54d6ed09bf24ba.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
3e488cd6f6cc7b35713c321dc58b63fa95ba9c69248008109b7bf9a543add7e9.exe
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
3e488cd6f6cc7b35713c321dc58b63fa95ba9c69248008109b7bf9a543add7e9.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
505fe3cf697c698f75b5135389463f40af5c90b576cd1d637db3400fe2701bcb.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
505fe3cf697c698f75b5135389463f40af5c90b576cd1d637db3400fe2701bcb.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
6543c547b83be07c11742aebcba0264026667005c7d4b90ca9ee8da62ad06984.exe
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
6543c547b83be07c11742aebcba0264026667005c7d4b90ca9ee8da62ad06984.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360.exe
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
NEAS.arm7elf_JC.elf
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral19
Sample
a23543464a64fea0ed91623e16dc9631a2274c4a4f929a04eacf149590c6c448.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
a23543464a64fea0ed91623e16dc9631a2274c4a4f929a04eacf149590c6c448.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
ad21aff38e3b20ca7c9c7236977dfb0821d515962cb5c705d8a5b9a8cbc43859.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
ad21aff38e3b20ca7c9c7236977dfb0821d515962cb5c705d8a5b9a8cbc43859.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
ba5ce65d728b5529fede411b5fb3b99e88a69c797e5bf8b89e18e42a9d6761ff.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
ba5ce65d728b5529fede411b5fb3b99e88a69c797e5bf8b89e18e42a9d6761ff.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
ca1af61fd2c6ecd3827b63604900beaaf6382c8bf6ef6b7a6e469e250f9b2e7f.elf
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral26
Sample
cad291a2df541313c6d296dcb798f5565ce591ca94f4649c21bc0e8b7e7a86eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
cad291a2df541313c6d296dcb798f5565ce591ca94f4649c21bc0e8b7e7a86eb.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
da8e7392c3c3d1c521d28c78d60425a2a5b7f52d17eb495d0e5cc581737344fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
da8e7392c3c3d1c521d28c78d60425a2a5b7f52d17eb495d0e5cc581737344fb.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
e3a0367cf2ebe9a41c5972ce3e53c1eb89d81fa01d1fe3e29ecca89af8f5a802.exe
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
e3a0367cf2ebe9a41c5972ce3e53c1eb89d81fa01d1fe3e29ecca89af8f5a802.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
f8ac9d00a184e45b3c8600507eb21194712ea65d0e8e72657963c870f039d21b.exe
Resource
win7-20230831-en
General
-
Target
37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe
-
Size
953KB
-
MD5
5fc3bd9632a02f189d81f75fc3b12ebf
-
SHA1
6abbc78a6fb421adf80051365dbfaff0b3fb696b
-
SHA256
37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60
-
SHA512
cf0b9df6db5c85ebc85967dbfbdd99ada401f718445f69f258d9d0a9466f7b58a7bb2f1287cb5679988bd79b42807fa0e0e7fc419557f0af3fbb620b40b2c2af
-
SSDEEP
12288:OzEPMLC814R2hig4tHkg2W+AU+R2TjsPvEpv8LpgUO4EP3SL98l0zmWHQuTwYzz5:0ztQE1ov2AZ9HjkftWyq
Malware Config
Extracted
C:\Users\Admin\Documents\PLEASEREAD.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
resource yara_rule behavioral4/memory/4136-0-0x0000000000390000-0x0000000000484000-memory.dmp family_chaos -
Renames multiple (215) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PLEASEREAD.txt 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\Contacts\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Music\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Public\Documents\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Public\Music\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Public\Videos\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2344688013-2965468717-2034126-1000\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Links\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2552 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2552 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 91 PID 4136 wrote to memory of 2552 4136 37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe"C:\Users\Admin\AppData\Local\Temp\37ca1cfa1f30b57408d3e855f98f9e5fd6900b23643bbc0c6163a875edf00b60.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\PLEASEREAD.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5929ad339c51b2a3b1bd4b3b7acf47379
SHA1b555580144c617a5950aa55a800b09decb5e4c80
SHA256b94bd148bc968f4e6c70f8479a16588424d587812cd17e9b2cc4ba8766d1b5d8
SHA5120319b0c3a4b7223a489b7883b9a6d5f6c51fc0285a96940635b0247e0162b7a6bcc48c5c91b0896e1d676b5bbeac5e8ada4eb200b847cda1a33efc31be020dda
-
Filesize
823B
MD5929ad339c51b2a3b1bd4b3b7acf47379
SHA1b555580144c617a5950aa55a800b09decb5e4c80
SHA256b94bd148bc968f4e6c70f8479a16588424d587812cd17e9b2cc4ba8766d1b5d8
SHA5120319b0c3a4b7223a489b7883b9a6d5f6c51fc0285a96940635b0247e0162b7a6bcc48c5c91b0896e1d676b5bbeac5e8ada4eb200b847cda1a33efc31be020dda