Analysis
-
max time kernel
1s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 08:18
Behavioral task
behavioral1
Sample
Encrypter.vmp.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Encrypter.vmp.exe
Resource
win10v2004-20240508-en
General
-
Target
Encrypter.vmp.exe
-
Size
5.5MB
-
MD5
1e613de3965c7dbe1d5631ccde8faa7e
-
SHA1
52ec6d728ffa8dd8b6e9164f5cc2503b73fcd290
-
SHA256
5944b89d1e35e40c32c255f5c32d63432f535be4b3389834f2ecc21e9d9f36d5
-
SHA512
059cce84953c9669520fca04228b4a83da707545693c7383ad03a9e4bf2bfed8f46c29c45ab8cbade69cda7adcecba1d157453356a76ef340c0bb706556c498a
-
SSDEEP
98304:+/MTZVvwqToyi8HJLubfv+bpaaGBJZ+dLwgfSrzCRNUVhApSHe03:RTfZTnpqv+taHYwy6WRCLeo
Malware Config
Extracted
C:\Users\Admin\Desktop\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral2/files/0x000700000002354d-18.dat family_chaos behavioral2/memory/1976-79-0x00000000004B0000-0x00000000004BC000-memory.dmp family_chaos -
resource yara_rule behavioral2/memory/2696-1-0x0000000000400000-0x0000000000D63000-memory.dmp vmprotect behavioral2/memory/2696-12-0x0000000000400000-0x0000000000D63000-memory.dmp vmprotect behavioral2/memory/2696-13-0x0000000000400000-0x0000000000D63000-memory.dmp vmprotect behavioral2/files/0x000700000002354e-78.dat vmprotect behavioral2/memory/2696-140-0x0000000000400000-0x0000000000D63000-memory.dmp vmprotect behavioral2/memory/4296-149-0x0000000000400000-0x0000000000D63000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2696 Encrypter.vmp.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2116 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2696 Encrypter.vmp.exe 2696 Encrypter.vmp.exe 2696 Encrypter.vmp.exe 2696 Encrypter.vmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Encrypter.vmp.exe"C:\Users\Admin\AppData\Local\Temp\Encrypter.vmp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter.vmp.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter.vmp.exe"2⤵PID:1976
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵PID:5024
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt4⤵
- Opens file in notepad (likely ransom note)
PID:2116
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵PID:1536
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵PID:3332
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵PID:784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3760,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵PID:3188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD51e613de3965c7dbe1d5631ccde8faa7e
SHA152ec6d728ffa8dd8b6e9164f5cc2503b73fcd290
SHA2565944b89d1e35e40c32c255f5c32d63432f535be4b3389834f2ecc21e9d9f36d5
SHA512059cce84953c9669520fca04228b4a83da707545693c7383ad03a9e4bf2bfed8f46c29c45ab8cbade69cda7adcecba1d157453356a76ef340c0bb706556c498a
-
Filesize
22KB
MD56ac60b3f3fc089844b316b8edcb6cbdb
SHA1b4fc7bfd470f3dc67a3b3a9ddcf2dbd26dcaf2b3
SHA256657c0d869ee0e44742e138b18533577b7c9bca8d40ffe5b658d80459e4f8f4d9
SHA512af218350125ea6ab9da68bb2edc7dfbdb023f0fc7ff2c446059d739fccc3891ad1974882275cedd2bf42fbbf2fd9ea50fa2d149a4c5cfbd9a23fa37e29071ecf
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
920B
MD596e58c047ee337ee491fbc24f95405a0
SHA100caeea02ff70f1e523a9d618ee22cac3b9cc30b
SHA256e631d7ac377fb25957aef0cf348a9531682e88fb2c438b9e7ae828182d370419
SHA5124d902a9c9a7b1b19d5e0d064da928d38c22d221405da9beb370fdef9cba252f8410a96a6d7c4e622cdccb4da1b06a92db8f09d300e7e7dc198068d9e72acb381