General
-
Target
Vm.jpeg
-
Size
1KB
-
Sample
240216-k4twwsff56
-
MD5
963255911b226b2cb4e92381bc86547b
-
SHA1
2809c265b4fce2809c4057027cda650219d023a5
-
SHA256
768f7d4c30fb287eed6f429055575e10fa3d67419116b55105d2ebdbfecf633c
-
SHA512
32825f83595a4497afbc6e7e09dc9d8cb8921685f8d98efd29fa36e6ffab7ca5589426f47b011daaf16e245b1ab3d74748e5ef0cb42e96aadea77737dacbcdf8
Static task
static1
Behavioral task
behavioral1
Sample
Vm.jpg
Resource
win10-20240214-en
Malware Config
Targets
-
-
Target
Vm.jpeg
-
Size
1KB
-
MD5
963255911b226b2cb4e92381bc86547b
-
SHA1
2809c265b4fce2809c4057027cda650219d023a5
-
SHA256
768f7d4c30fb287eed6f429055575e10fa3d67419116b55105d2ebdbfecf633c
-
SHA512
32825f83595a4497afbc6e7e09dc9d8cb8921685f8d98efd29fa36e6ffab7ca5589426f47b011daaf16e245b1ab3d74748e5ef0cb42e96aadea77737dacbcdf8
-
Chaos Ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
3Pre-OS Boot
1Bootkit
1