Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-02-2024 08:46

General

  • Target

    976cfac92a033f26ebde6eac45416c3db0fb88a963e9026fc67d115e9ba3b9e6.exe

  • Size

    181KB

  • MD5

    a321ec0a5cb29407a0fa4d8e39586dee

  • SHA1

    5a7fb5ee8a0cc0482fe6dce7a80696bd92ef0ca9

  • SHA256

    976cfac92a033f26ebde6eac45416c3db0fb88a963e9026fc67d115e9ba3b9e6

  • SHA512

    21e0f35818d7015a9b639929064fa89d83f712c472f23dcf0863742e9daf24120812c3adca4d8c46fc9d1201b20c80a9810e847b92722da8665ba33a4247517e

  • SSDEEP

    3072:3NSvwL1IDAdAN+Uj7xRQIb+GinxNNB/hwlPaMhg/pxeJjYekLfncU1AlLncSRq5W:dSvwL6DAdAN+Uj7xRQIb2xY3hgxxedbF

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Renames multiple (238) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\976cfac92a033f26ebde6eac45416c3db0fb88a963e9026fc67d115e9ba3b9e6.exe
    "C:\Users\Admin\AppData\Local\Temp\976cfac92a033f26ebde6eac45416c3db0fb88a963e9026fc67d115e9ba3b9e6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\oku.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:3604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    181KB

    MD5

    a321ec0a5cb29407a0fa4d8e39586dee

    SHA1

    5a7fb5ee8a0cc0482fe6dce7a80696bd92ef0ca9

    SHA256

    976cfac92a033f26ebde6eac45416c3db0fb88a963e9026fc67d115e9ba3b9e6

    SHA512

    21e0f35818d7015a9b639929064fa89d83f712c472f23dcf0863742e9daf24120812c3adca4d8c46fc9d1201b20c80a9810e847b92722da8665ba33a4247517e

  • C:\Users\Admin\Documents\oku.txt

    Filesize

    275B

    MD5

    7c810579bbb67a19a1dae9977457ea36

    SHA1

    09253671d3dfd337bbce7e3f5ffe3b6b4e8a011a

    SHA256

    e856648187d853d2a2f56198530d98d6ee84ca697aefec12b60351ff004a2a87

    SHA512

    84ccd5ef54bb6618bd642cc11f9d14b1a3fbefa92b51de3adc9b43f7f9d90cb2fee9f12517f982960c531d8c9e424f574a0101550310647dd956a84d0e61a6b7

  • memory/1608-14-0x00007FFB16A40000-0x00007FFB17501000-memory.dmp

    Filesize

    10.8MB

  • memory/1608-547-0x00007FFB16A40000-0x00007FFB17501000-memory.dmp

    Filesize

    10.8MB

  • memory/2956-0-0x0000000000830000-0x0000000000864000-memory.dmp

    Filesize

    208KB

  • memory/2956-1-0x00007FFB16A40000-0x00007FFB17501000-memory.dmp

    Filesize

    10.8MB

  • memory/2956-15-0x00007FFB16A40000-0x00007FFB17501000-memory.dmp

    Filesize

    10.8MB