Analysis

  • max time kernel
    569s
  • max time network
    421s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2023 01:25

General

  • Target

    Chaos Ransomware Builder v4.exe

  • Size

    550KB

  • MD5

    8b855e56e41a6e10d28522a20c1e0341

  • SHA1

    17ea75272cfe3749c6727388fd444d2c970f9d01

  • SHA256

    f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77

  • SHA512

    eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908

  • SSDEEP

    3072:9UJAYdi2YcRVm16Pn6tpzqJG/sX9i2YcRPm16Pn6ckCjSH5EyR9aKZt18rTu+i2S:9aiWm162qJEsNiym16ryAiym168

Score
10/10

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe
    "C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2224
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:920
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1588
    • C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe
      "C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3268
    • C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe
      "C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1588-13-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-16-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-17-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-18-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-15-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-14-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-6-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-7-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-8-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/1588-12-0x00000168A8630000-0x00000168A8631000-memory.dmp

      Filesize

      4KB

    • memory/2224-19-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-23-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-4-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-3-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-2-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-1-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/2224-0-0x0000000000460000-0x00000000004EE000-memory.dmp

      Filesize

      568KB

    • memory/2224-20-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/2224-5-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/2224-22-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

      Filesize

      64KB

    • memory/3268-24-0x000000001B840000-0x000000001B850000-memory.dmp

      Filesize

      64KB

    • memory/3268-21-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/3268-25-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/3268-28-0x000000001B840000-0x000000001B850000-memory.dmp

      Filesize

      64KB

    • memory/3268-30-0x000000001B840000-0x000000001B850000-memory.dmp

      Filesize

      64KB

    • memory/4384-26-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/4384-27-0x000000001ACD0000-0x000000001ACE0000-memory.dmp

      Filesize

      64KB

    • memory/4384-29-0x000000001ACD0000-0x000000001ACE0000-memory.dmp

      Filesize

      64KB

    • memory/4384-31-0x00007FFBC00A0000-0x00007FFBC0B61000-memory.dmp

      Filesize

      10.8MB

    • memory/4384-32-0x000000001ACD0000-0x000000001ACE0000-memory.dmp

      Filesize

      64KB

    • memory/4384-33-0x000000001ACD0000-0x000000001ACE0000-memory.dmp

      Filesize

      64KB

    • memory/4384-34-0x000000001ACD0000-0x000000001ACE0000-memory.dmp

      Filesize

      64KB