Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
e1ac6283bd50e46c49ea0cfae49e4a8f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1ac6283bd50e46c49ea0cfae49e4a8f.exe
Resource
win10v2004-20240319-en
General
-
Target
e1ac6283bd50e46c49ea0cfae49e4a8f.exe
-
Size
40KB
-
MD5
e1ac6283bd50e46c49ea0cfae49e4a8f
-
SHA1
e0f4c6caf5e8b119a1b302591a39511872eb11cd
-
SHA256
68ec37ccb2e6682f6f444b13b9d6f0098ef45774dcf856328d7c9af440891679
-
SHA512
ca612f7b82e178feddaa14cdde0a1e25a65e5d1c0868ff39bb4db3447cba909ffa5bb813b8bf5ab038d33d45a7ea95de200cfd59d5cae890507aba8cc7556223
-
SSDEEP
768:UzctJwrPdpe9rrG5XdO1AF97rds0/poHWFC6JORwxIpizMAO2:actJgPW9rrGNdO1AjvWqS246WNizg2
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 7 IoCs
resource yara_rule behavioral1/memory/2612-9-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2612-8-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2612-12-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2612-16-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2612-14-0x0000000000400000-0x000000000040C000-memory.dmp family_chaos behavioral1/memory/2660-29-0x0000000004750000-0x0000000004790000-memory.dmp family_chaos behavioral1/memory/2660-31-0x0000000004750000-0x0000000004790000-memory.dmp family_chaos -
Executes dropped EXE 2 IoCs
pid Process 2660 svchost.exe 2768 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1704 set thread context of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 2660 set thread context of 2768 2660 svchost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 2768 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe Token: SeDebugPrivilege 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe Token: SeDebugPrivilege 2768 svchost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2540 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 28 PID 1704 wrote to memory of 2540 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 28 PID 1704 wrote to memory of 2540 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 28 PID 1704 wrote to memory of 2540 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 28 PID 1704 wrote to memory of 2252 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 29 PID 1704 wrote to memory of 2252 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 29 PID 1704 wrote to memory of 2252 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 29 PID 1704 wrote to memory of 2252 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 29 PID 1704 wrote to memory of 2672 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 30 PID 1704 wrote to memory of 2672 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 30 PID 1704 wrote to memory of 2672 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 30 PID 1704 wrote to memory of 2672 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 30 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 1704 wrote to memory of 2612 1704 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 31 PID 2612 wrote to memory of 2660 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 32 PID 2612 wrote to memory of 2660 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 32 PID 2612 wrote to memory of 2660 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 32 PID 2612 wrote to memory of 2660 2612 e1ac6283bd50e46c49ea0cfae49e4a8f.exe 32 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35 PID 2660 wrote to memory of 2768 2660 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"2⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5e1ac6283bd50e46c49ea0cfae49e4a8f
SHA1e0f4c6caf5e8b119a1b302591a39511872eb11cd
SHA25668ec37ccb2e6682f6f444b13b9d6f0098ef45774dcf856328d7c9af440891679
SHA512ca612f7b82e178feddaa14cdde0a1e25a65e5d1c0868ff39bb4db3447cba909ffa5bb813b8bf5ab038d33d45a7ea95de200cfd59d5cae890507aba8cc7556223