Resubmissions

31-03-2024 14:56

240331-sa6ycsdg9y 10

27-03-2024 12:31

240327-pp4vrsfc3z 10

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 12:31

General

  • Target

    e1ac6283bd50e46c49ea0cfae49e4a8f.exe

  • Size

    40KB

  • MD5

    e1ac6283bd50e46c49ea0cfae49e4a8f

  • SHA1

    e0f4c6caf5e8b119a1b302591a39511872eb11cd

  • SHA256

    68ec37ccb2e6682f6f444b13b9d6f0098ef45774dcf856328d7c9af440891679

  • SHA512

    ca612f7b82e178feddaa14cdde0a1e25a65e5d1c0868ff39bb4db3447cba909ffa5bb813b8bf5ab038d33d45a7ea95de200cfd59d5cae890507aba8cc7556223

  • SSDEEP

    768:UzctJwrPdpe9rrG5XdO1AF97rds0/poHWFC6JORwxIpizMAO2:actJgPW9rrGNdO1AjvWqS246WNizg2

Score
10/10

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe
      "C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"
      2⤵
        PID:2540
      • C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe
        "C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"
        2⤵
          PID:2252
        • C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe
          "C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"
          2⤵
            PID:2672
          • C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe
            "C:\Users\Admin\AppData\Local\Temp\e1ac6283bd50e46c49ea0cfae49e4a8f.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2612
            • C:\Users\Admin\AppData\Roaming\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2660
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2768

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          40KB

          MD5

          e1ac6283bd50e46c49ea0cfae49e4a8f

          SHA1

          e0f4c6caf5e8b119a1b302591a39511872eb11cd

          SHA256

          68ec37ccb2e6682f6f444b13b9d6f0098ef45774dcf856328d7c9af440891679

          SHA512

          ca612f7b82e178feddaa14cdde0a1e25a65e5d1c0868ff39bb4db3447cba909ffa5bb813b8bf5ab038d33d45a7ea95de200cfd59d5cae890507aba8cc7556223

        • memory/1704-0-0x0000000000320000-0x0000000000330000-memory.dmp

          Filesize

          64KB

        • memory/1704-1-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/1704-2-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1704-3-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/1704-4-0x0000000004A60000-0x0000000004AA0000-memory.dmp

          Filesize

          256KB

        • memory/1704-5-0x00000000003B0000-0x00000000003BE000-memory.dmp

          Filesize

          56KB

        • memory/1704-17-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2612-16-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-27-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2612-8-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-12-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-9-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-14-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-6-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-18-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2612-7-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2612-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2660-26-0x0000000000E10000-0x0000000000E20000-memory.dmp

          Filesize

          64KB

        • memory/2660-28-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2660-29-0x0000000004750000-0x0000000004790000-memory.dmp

          Filesize

          256KB

        • memory/2660-30-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2660-31-0x0000000004750000-0x0000000004790000-memory.dmp

          Filesize

          256KB

        • memory/2660-45-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB

        • memory/2768-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2768-44-0x0000000074C60000-0x000000007534E000-memory.dmp

          Filesize

          6.9MB