General
-
Target
chocolate_nowin.zip
-
Size
26KB
-
Sample
231224-c3gk6sdfam
-
MD5
27c3177d59bf4d4531d9fe8671d5e29c
-
SHA1
cdc87168aa0d4ba97467f0df45930a24631679c2
-
SHA256
4ec289cd5c113fa566539f1205cf8b3116d38338050705c340aa2f8118a4d291
-
SHA512
e9c881a8fb8a058d8c28ebbf3e58460c85670f6e200904aa25843a4110c29dcbed7bfe27f9f7bd32666108d5c44f5231bc89bec1ff49ffffa7768628714efb2a
-
SSDEEP
768:x4YGhHbx7ux2OtqJ0NrYBd69O59GKbup7IU5k:xfGbxpOdNrYjHGKbjD
Behavioral task
behavioral1
Sample
chocolate_nowin.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
chocolate_nowin.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
chocolate_nowin.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral4
Sample
chocolate_nowin.exe
Resource
win11-20231215-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Targets
-
-
Target
chocolate_nowin.exe
-
Size
42KB
-
MD5
c3eb80e8aa150aa10b82a5975c17a116
-
SHA1
3d8e7c04891606b47c27e8225c27f385de3100e5
-
SHA256
92cc252d8eebc2d64aaf63f383eb549e46d115409ec2d537a3ff935b3f1ff40b
-
SHA512
b676cfef912f24aa2e96ca2bc0b73e808702450f1d4439498f0ccd53248f4b6d88fa753d09e155da5d08bf3d77d794c36a16678774402f327263a3175c5e520d
-
SSDEEP
768:5O1oR/fVS1RzK4wbs+D/SIJX+ZZ1SQQwZuIOPzDX5aBd69O59GKbup7IU5F:5FS1FKnDtkuImX4jHGKbj8
Score10/10-
Renames multiple (9614) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-