Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 00:41

General

  • Target

    2024-04-05_70f91a30c28edfa07a360ba6141af2d3_chaos_destroyer_wannacry.exe

  • Size

    27KB

  • MD5

    70f91a30c28edfa07a360ba6141af2d3

  • SHA1

    f5e7282c42b372f7d884ab5f6c2ea2574928e3d6

  • SHA256

    b2121cc12e8d7b6e605f120de83f4c58c59e93f4ddb28dae3733a5dee9f42161

  • SHA512

    bea280a8a5f5059ed933b8f8c6e8da7e68eaf01592190d97175b1aa2431600e15c514d1f26fb2da5f1bcf912e9877f138163a92a1ff2f889c75d9b494e3f914f

  • SSDEEP

    384:Ib3MLWHn3kIGOozgJQoApuVgjuRJqIr91CrebHtPeKfJ8YGAal6Wo5:Kn3kIYg6pumjiVr9SebpeKhvGeWo5

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in usdt trc20 only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: TQNt8wXTF1gcwqPnhh6J6FB5iF247JhAbr

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_70f91a30c28edfa07a360ba6141af2d3_chaos_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_70f91a30c28edfa07a360ba6141af2d3_chaos_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    27KB

    MD5

    70f91a30c28edfa07a360ba6141af2d3

    SHA1

    f5e7282c42b372f7d884ab5f6c2ea2574928e3d6

    SHA256

    b2121cc12e8d7b6e605f120de83f4c58c59e93f4ddb28dae3733a5dee9f42161

    SHA512

    bea280a8a5f5059ed933b8f8c6e8da7e68eaf01592190d97175b1aa2431600e15c514d1f26fb2da5f1bcf912e9877f138163a92a1ff2f889c75d9b494e3f914f

  • C:\Users\Admin\Desktop\read_it.txt

    Filesize

    959B

    MD5

    30367b4cffa6974e75f6863ea3075ed9

    SHA1

    e5f1c8b71db6dce698c51333eae4d60a3a69b2ef

    SHA256

    5a0debe6b85fa438076769ef80b2118c44f8e216827be233b4dd58e325307243

    SHA512

    f125223772db5a8cd83e079fd1695ae50bbe7ecedd9c3b0909d41e9f5073a473fab4378d280efb7c9994062f8427fd263f6946aec6d6997d2b8231bced6e8ac3

  • memory/1692-0-0x0000000000290000-0x000000000029C000-memory.dmp

    Filesize

    48KB

  • memory/1692-1-0x000007FEF62D0000-0x000007FEF6CBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1692-8-0x000007FEF62D0000-0x000007FEF6CBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-7-0x0000000001080000-0x000000000108C000-memory.dmp

    Filesize

    48KB

  • memory/1964-9-0x000007FEF62D0000-0x000007FEF6CBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-71-0x000000001AE10000-0x000000001AE90000-memory.dmp

    Filesize

    512KB

  • memory/1964-72-0x000007FEF62D0000-0x000007FEF6CBC000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-73-0x000000001AE10000-0x000000001AE90000-memory.dmp

    Filesize

    512KB