General
-
Target
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def
-
Size
335KB
-
Sample
240227-mzhn6seh64
-
MD5
baad3244b1b5663e0a7f121d90edd298
-
SHA1
22a518e2ab331a1eaff6069b722d627638fbfbef
-
SHA256
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def
-
SHA512
9a3d61ef1061528aa9ca7289aa50af1d5d5b755159dd231d4a1594354992719f3f29058411a1bac38fc97b2a73cf6159b181b55e416a002404f053d5140a58ca
-
SSDEEP
6144:0D9c9kL94GeFdhL29TuuXglosdU4GjbKqBaQy/oOERKlJ6LaY8:0x54GeFddmpXg+sdUhjWsat/oOERKz6G
Behavioral task
behavioral1
Sample
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_me.txt
Targets
-
-
Target
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def
-
Size
335KB
-
MD5
baad3244b1b5663e0a7f121d90edd298
-
SHA1
22a518e2ab331a1eaff6069b722d627638fbfbef
-
SHA256
e48138f16524da77e9d85ec11596e668664c116bcd3c995641af0d52c0526def
-
SHA512
9a3d61ef1061528aa9ca7289aa50af1d5d5b755159dd231d4a1594354992719f3f29058411a1bac38fc97b2a73cf6159b181b55e416a002404f053d5140a58ca
-
SSDEEP
6144:0D9c9kL94GeFdhL29TuuXglosdU4GjbKqBaQy/oOERKlJ6LaY8:0x54GeFddmpXg+sdUhjWsat/oOERKz6G
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Modifies boot configuration data using bcdedit
-
Renames multiple (169) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-