Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
dd52f625ebf11a32c79f2925bb2b6bd0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dd52f625ebf11a32c79f2925bb2b6bd0.exe
Resource
win10v2004-20240226-en
General
-
Target
dd52f625ebf11a32c79f2925bb2b6bd0.exe
-
Size
64KB
-
MD5
dd52f625ebf11a32c79f2925bb2b6bd0
-
SHA1
381c59f582f006702e1f797fb10cf0e412bb700a
-
SHA256
41aec0ed3bc8bd1d989c22e50b447a88740505fed4113c0ebe4e1e1792fef3d5
-
SHA512
49588a8bd9d59b1811332726207b8abc4c6f24918f0c8563e237467ad8450e8727a3f6f0677d8ec0917094df27acd46a59debcc40d8bea9d15956a9000a71254
-
SSDEEP
1536:uOItYxqnAC6ph6ggxX4elW2GJYfGAQ61INw+:fI+xSL6CfxoZ2GJJAQw+
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 5 IoCs
resource yara_rule behavioral1/memory/2656-34-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2656-32-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2656-29-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2656-25-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2656-23-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos -
Executes dropped EXE 6 IoCs
pid Process 2736 顾太望她.exe 2680 顾太望她.exe 2656 顾太望她.exe 2584 svchost.exe 2512 顾太望她.exe 776 顾太望她.exe -
Loads dropped DLL 6 IoCs
pid Process 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe 2736 顾太望她.exe 2736 顾太望她.exe 2656 顾太望她.exe 2584 svchost.exe 2512 顾太望她.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2736 set thread context of 2656 2736 顾太望她.exe 30 PID 2512 set thread context of 776 2512 顾太望她.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2736 顾太望她.exe 2656 顾太望她.exe 2656 顾太望她.exe 2656 顾太望她.exe 776 顾太望她.exe 776 顾太望她.exe 776 顾太望她.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe Token: SeDebugPrivilege 2736 顾太望她.exe Token: SeDebugPrivilege 2656 顾太望她.exe Token: SeDebugPrivilege 2584 svchost.exe Token: SeDebugPrivilege 2512 顾太望她.exe Token: SeDebugPrivilege 776 顾太望她.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2736 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe 28 PID 1756 wrote to memory of 2736 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe 28 PID 1756 wrote to memory of 2736 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe 28 PID 1756 wrote to memory of 2736 1756 dd52f625ebf11a32c79f2925bb2b6bd0.exe 28 PID 2736 wrote to memory of 2680 2736 顾太望她.exe 29 PID 2736 wrote to memory of 2680 2736 顾太望她.exe 29 PID 2736 wrote to memory of 2680 2736 顾太望她.exe 29 PID 2736 wrote to memory of 2680 2736 顾太望她.exe 29 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2736 wrote to memory of 2656 2736 顾太望她.exe 30 PID 2656 wrote to memory of 2584 2656 顾太望她.exe 31 PID 2656 wrote to memory of 2584 2656 顾太望她.exe 31 PID 2656 wrote to memory of 2584 2656 顾太望她.exe 31 PID 2656 wrote to memory of 2584 2656 顾太望她.exe 31 PID 2584 wrote to memory of 2512 2584 svchost.exe 32 PID 2584 wrote to memory of 2512 2584 svchost.exe 32 PID 2584 wrote to memory of 2512 2584 svchost.exe 32 PID 2584 wrote to memory of 2512 2584 svchost.exe 32 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33 PID 2512 wrote to memory of 776 2512 顾太望她.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd52f625ebf11a32c79f2925bb2b6bd0.exe"C:\Users\Admin\AppData\Local\Temp\dd52f625ebf11a32c79f2925bb2b6bd0.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"3⤵
- Executes dropped EXE
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"C:\Users\Admin\AppData\Local\Temp\顾太望她.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5dd52f625ebf11a32c79f2925bb2b6bd0
SHA1381c59f582f006702e1f797fb10cf0e412bb700a
SHA25641aec0ed3bc8bd1d989c22e50b447a88740505fed4113c0ebe4e1e1792fef3d5
SHA51249588a8bd9d59b1811332726207b8abc4c6f24918f0c8563e237467ad8450e8727a3f6f0677d8ec0917094df27acd46a59debcc40d8bea9d15956a9000a71254