Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 22:29

General

  • Target

    2024-04-25_f03897bf11c310994eaa232752e0f6ae_chaos_destroyer_wannacry.exe

  • Size

    23KB

  • MD5

    f03897bf11c310994eaa232752e0f6ae

  • SHA1

    47c664db7354b3d20fe46f60825a681d1653b75d

  • SHA256

    944d1f18292538fb36f385cb33ebee1e62c93cb277305a1d7ea1175ec1bbf0c1

  • SHA512

    68f0afac082d7af321c65c78f1f7476614b56034de8760ed5e4a36a519b2f7a44f87913d9a69eababdb2f166aed98fd7308bb1abae36d6fe89de12c74ad0fc4e

  • SSDEEP

    384:93MLWHn3kI3fw5zOppMsm6nJZr91CzCbwaeR:tn3kI1ppMszJZr9iCbVeR

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\read_me.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 50000000000000000 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-25_f03897bf11c310994eaa232752e0f6ae_chaos_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-25_f03897bf11c310994eaa232752e0f6ae_chaos_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_me.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    23KB

    MD5

    f03897bf11c310994eaa232752e0f6ae

    SHA1

    47c664db7354b3d20fe46f60825a681d1653b75d

    SHA256

    944d1f18292538fb36f385cb33ebee1e62c93cb277305a1d7ea1175ec1bbf0c1

    SHA512

    68f0afac082d7af321c65c78f1f7476614b56034de8760ed5e4a36a519b2f7a44f87913d9a69eababdb2f166aed98fd7308bb1abae36d6fe89de12c74ad0fc4e

  • C:\Users\Admin\Desktop\read_me.txt

    Filesize

    972B

    MD5

    ceefd69b7a5bf54138064bf7159288de

    SHA1

    b9ff77c44c9ee90472f296439d0ac243ab7c394d

    SHA256

    566cc6eeae00717cd1aeefd853f02ea6a24286ab679ba9d4839bb290650b69f7

    SHA512

    621b0f2d0e7c1e3abb86d441e6dac9f8e1f923cf68cc96b201cde9e936a57312291a5e0408f5f3554ac4523065fe143a182c4f23944c13082ae845632b2caa67

  • memory/2348-7-0x0000000000BF0000-0x0000000000BFC000-memory.dmp

    Filesize

    48KB

  • memory/2348-9-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-72-0x0000000000990000-0x0000000000A10000-memory.dmp

    Filesize

    512KB

  • memory/2348-74-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2348-75-0x0000000000990000-0x0000000000A10000-memory.dmp

    Filesize

    512KB

  • memory/2388-0-0x00000000009D0000-0x00000000009DC000-memory.dmp

    Filesize

    48KB

  • memory/2388-1-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2388-8-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

    Filesize

    9.9MB