Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    209s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 04:41

General

  • Target

    ransomware.exe

  • Size

    15KB

  • MD5

    ac6b23f341c93a5deb6692d8fed6f6a4

  • SHA1

    6466c45b8c8dd60f03392614063d1c490231bf03

  • SHA256

    cb84c85fb50de9ac3bc4763c504ca87067680bc129d44c256570f7e1449ab9c5

  • SHA512

    d4483be2b241c12da57785d861018e88d75fbda736e51900872d105f11309474393c8381d654c4cf74242a7f138e070983ace9836806232afda9dee30e3dd29f

  • SSDEEP

    192:1XiJtJHunl2T7IeLX/LnG8dcIbNbqiv8Fums5oglkr5i7amD2Ayqfiq1T5Fx/TAU:1Cul2nIePG2vVCZ87ThT1n

Malware Config

Extracted

Path

C:\Users\Admin\Pictures\read_it.txt

Ransom Note
All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help. What can I do to get my files back? You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer. The price for the software is $100. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: https://bitpay.com/ https://www.exodus.com/ https://www.blockchain.com/wallet Payment information Amount: 0.001638 BTC Bitcoin Address: bc1qgknk4e4z2keyqjzlm4pxpgte9ltklry5x3jv6s
URLs

https://bitpay.com/

https://www.exodus.com/

https://www.blockchain.com/wallet

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ransomware.exe
    "C:\Users\Admin\AppData\Local\Temp\ransomware.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        • Suspicious use of FindShellTrayWindow
        PID:432
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Drops startup file
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url

    Filesize

    142B

    MD5

    1a09a38485cbf1d59c29d8e3213e1ab9

    SHA1

    9cbe6ebd07b13a0d4b2565dc15a273629aa97251

    SHA256

    0a3bdc40dc0d243784bc5fa887b79110350b3d3200684f3ba99880fcea40e3b8

    SHA512

    a33c228196a4b3f14e40ac6ccb6c43002de28063594c472db852bedac20a6725f4e7601b9f32516e2c6bea35f83746973b3f1d200d9e5d668bda7553b62ac616

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    15KB

    MD5

    ac6b23f341c93a5deb6692d8fed6f6a4

    SHA1

    6466c45b8c8dd60f03392614063d1c490231bf03

    SHA256

    cb84c85fb50de9ac3bc4763c504ca87067680bc129d44c256570f7e1449ab9c5

    SHA512

    d4483be2b241c12da57785d861018e88d75fbda736e51900872d105f11309474393c8381d654c4cf74242a7f138e070983ace9836806232afda9dee30e3dd29f

  • C:\Users\Admin\Pictures\read_it.txt

    Filesize

    884B

    MD5

    18e13fb949ed44a7a60c867626989b17

    SHA1

    fa3766fa77f5353e34566f08980241da958a0526

    SHA256

    6e042f64e2ca554ceff5983f1efad19d1d409c2be80be8c306f27afc57e97798

    SHA512

    8cd750017c2d83c50fdfb7c52bde8c26b4d926e59d985dfe33c7be354142476a23993461144df987942af5d2e22f563f80b7bfcd8b30fa895fa4b7101fa0532c

  • memory/2328-14-0x00007FFE899C0000-0x00007FFE8A481000-memory.dmp

    Filesize

    10.8MB

  • memory/2328-126-0x00007FFE899C0000-0x00007FFE8A481000-memory.dmp

    Filesize

    10.8MB

  • memory/3300-0-0x00007FFE899C3000-0x00007FFE899C5000-memory.dmp

    Filesize

    8KB

  • memory/3300-1-0x0000000000690000-0x000000000069A000-memory.dmp

    Filesize

    40KB

  • memory/4104-129-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-128-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-134-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-139-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-138-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-137-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-136-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-135-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-133-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB

  • memory/4104-127-0x000001E670730000-0x000001E670731000-memory.dmp

    Filesize

    4KB