Analysis
-
max time kernel
12s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 08:21
Behavioral task
behavioral1
Sample
Encrypter_protected.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Encrypter_protected.exe
Resource
win10v2004-20240226-en
General
-
Target
Encrypter_protected.exe
-
Size
5.0MB
-
MD5
0ab2a8b3f487b14f24db2d611eaa1627
-
SHA1
927990d479f9c6bb3df78442004feccad4577920
-
SHA256
11b11b72193938040f5ae32ebd1eb238c9fcd6ba30f8127bd0a0ca5b2cecc5f0
-
SHA512
bedcf4c0bee5a90a72ba1d17fa9358ae8001cead67280e6edc2b82df440b177f6a97ac3c7aade237e9753ee9eec966aebe4fece1b4c0fcc2e062c5055781357a
-
SSDEEP
98304:elSSzfc2xJTS4VdJY+ZavQU+PiX1/La2TTyH:elSS42xJTzVHYAan1/maTyH
Malware Config
Extracted
C:\Users\Admin\Desktop\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 10 IoCs
resource yara_rule behavioral1/memory/2116-4-0x00000000002E0000-0x0000000000F1E000-memory.dmp family_chaos behavioral1/memory/2116-5-0x00000000002E0000-0x0000000000F1E000-memory.dmp family_chaos behavioral1/files/0x004f000000015d40-10.dat family_chaos behavioral1/memory/2116-19-0x0000000004470000-0x0000000004480000-memory.dmp family_chaos behavioral1/memory/2320-31-0x0000000000930000-0x000000000093C000-memory.dmp family_chaos behavioral1/memory/2884-39-0x0000000000840000-0x000000000147E000-memory.dmp family_chaos behavioral1/memory/2884-36-0x0000000000840000-0x000000000147E000-memory.dmp family_chaos behavioral1/memory/2116-97-0x00000000002E0000-0x0000000000F1E000-memory.dmp family_chaos behavioral1/memory/2476-112-0x0000000000C60000-0x0000000000C6C000-memory.dmp family_chaos behavioral1/memory/2884-115-0x0000000000840000-0x000000000147E000-memory.dmp family_chaos -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Encrypter_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Synaptics.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Encrypter_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Encrypter_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Synaptics.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 2320 ._cache_Encrypter_protected.exe 2884 Synaptics.exe 2532 svchost.exe 2476 ._cache_Synaptics.exe 1540 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2116 Encrypter_protected.exe 2116 Encrypter_protected.exe 2116 Encrypter_protected.exe 2884 Synaptics.exe 2884 Synaptics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2116-0-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/memory/2116-2-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/memory/2116-4-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/memory/2116-3-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/memory/2116-5-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/files/0x0022000000015d71-17.dat themida behavioral1/memory/2884-30-0x0000000000840000-0x000000000147E000-memory.dmp themida behavioral1/memory/2884-39-0x0000000000840000-0x000000000147E000-memory.dmp themida behavioral1/memory/2884-34-0x0000000000840000-0x000000000147E000-memory.dmp themida behavioral1/memory/2884-36-0x0000000000840000-0x000000000147E000-memory.dmp themida behavioral1/memory/2884-35-0x0000000000840000-0x000000000147E000-memory.dmp themida behavioral1/memory/2116-97-0x00000000002E0000-0x0000000000F1E000-memory.dmp themida behavioral1/memory/2884-107-0x00000000035A0000-0x00000000035B0000-memory.dmp themida behavioral1/memory/2884-115-0x0000000000840000-0x000000000147E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Encrypter_protected.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Encrypter_protected.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Synaptics.exe -
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2116 Encrypter_protected.exe 2884 Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2528 2116 WerFault.exe 27 -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1260 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2116 Encrypter_protected.exe 2884 Synaptics.exe 2320 ._cache_Encrypter_protected.exe 2320 ._cache_Encrypter_protected.exe 2320 ._cache_Encrypter_protected.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2476 ._cache_Synaptics.exe 2476 ._cache_Synaptics.exe 2476 ._cache_Synaptics.exe 1540 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2320 ._cache_Encrypter_protected.exe Token: SeDebugPrivilege 2532 svchost.exe Token: SeDebugPrivilege 2476 ._cache_Synaptics.exe Token: SeDebugPrivilege 1540 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2320 2116 Encrypter_protected.exe 28 PID 2116 wrote to memory of 2320 2116 Encrypter_protected.exe 28 PID 2116 wrote to memory of 2320 2116 Encrypter_protected.exe 28 PID 2116 wrote to memory of 2320 2116 Encrypter_protected.exe 28 PID 2116 wrote to memory of 2884 2116 Encrypter_protected.exe 29 PID 2116 wrote to memory of 2884 2116 Encrypter_protected.exe 29 PID 2116 wrote to memory of 2884 2116 Encrypter_protected.exe 29 PID 2116 wrote to memory of 2884 2116 Encrypter_protected.exe 29 PID 2116 wrote to memory of 2528 2116 Encrypter_protected.exe 30 PID 2116 wrote to memory of 2528 2116 Encrypter_protected.exe 30 PID 2116 wrote to memory of 2528 2116 Encrypter_protected.exe 30 PID 2116 wrote to memory of 2528 2116 Encrypter_protected.exe 30 PID 2320 wrote to memory of 2532 2320 ._cache_Encrypter_protected.exe 31 PID 2320 wrote to memory of 2532 2320 ._cache_Encrypter_protected.exe 31 PID 2320 wrote to memory of 2532 2320 ._cache_Encrypter_protected.exe 31 PID 2884 wrote to memory of 2476 2884 Synaptics.exe 33 PID 2884 wrote to memory of 2476 2884 Synaptics.exe 33 PID 2884 wrote to memory of 2476 2884 Synaptics.exe 33 PID 2884 wrote to memory of 2476 2884 Synaptics.exe 33 PID 2476 wrote to memory of 1540 2476 ._cache_Synaptics.exe 34 PID 2476 wrote to memory of 1540 2476 ._cache_Synaptics.exe 34 PID 2476 wrote to memory of 1540 2476 ._cache_Synaptics.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt4⤵
- Opens file in notepad (likely ransom note)
PID:1260
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 6522⤵
- Program crash
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD50ab2a8b3f487b14f24db2d611eaa1627
SHA1927990d479f9c6bb3df78442004feccad4577920
SHA25611b11b72193938040f5ae32ebd1eb238c9fcd6ba30f8127bd0a0ca5b2cecc5f0
SHA512bedcf4c0bee5a90a72ba1d17fa9358ae8001cead67280e6edc2b82df440b177f6a97ac3c7aade237e9753ee9eec966aebe4fece1b4c0fcc2e062c5055781357a
-
Filesize
920B
MD596e58c047ee337ee491fbc24f95405a0
SHA100caeea02ff70f1e523a9d618ee22cac3b9cc30b
SHA256e631d7ac377fb25957aef0cf348a9531682e88fb2c438b9e7ae828182d370419
SHA5124d902a9c9a7b1b19d5e0d064da928d38c22d221405da9beb370fdef9cba252f8410a96a6d7c4e622cdccb4da1b06a92db8f09d300e7e7dc198068d9e72acb381
-
Filesize
22KB
MD56ac60b3f3fc089844b316b8edcb6cbdb
SHA1b4fc7bfd470f3dc67a3b3a9ddcf2dbd26dcaf2b3
SHA256657c0d869ee0e44742e138b18533577b7c9bca8d40ffe5b658d80459e4f8f4d9
SHA512af218350125ea6ab9da68bb2edc7dfbdb023f0fc7ff2c446059d739fccc3891ad1974882275cedd2bf42fbbf2fd9ea50fa2d149a4c5cfbd9a23fa37e29071ecf