Malware Analysis Report

2024-08-06 16:12

Sample ID 240702-kadmtatglc
Target Encrypter_protected.exe
SHA256 544deae2250cf2af18927bd25558a889203cb601efa171f15d550cf28f613978
Tags
chaos ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

544deae2250cf2af18927bd25558a889203cb601efa171f15d550cf28f613978

Threat Level: Known bad

The file Encrypter_protected.exe was found to be: Known bad.

Malicious Activity Summary

chaos ransomware spyware stealer

Chaos

Chaos Ransomware

Drops startup file

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Drops desktop.ini file(s)

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

Checks processor information in registry

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Opens file in notepad (likely ransom note)

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-02 08:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-02 08:23

Reported

2024-07-02 08:24

Platform

win7-20240508-en

Max time kernel

30s

Max time network

30s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A

Enumerates physical storage devices

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1612 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 1612 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 1612 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 1612 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 1612 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 1612 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 1612 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 1612 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2652 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2652 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2652 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2436 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Roaming\svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 2436 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Roaming\svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 2436 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Roaming\svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 2988 wrote to memory of 2784 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2988 wrote to memory of 2784 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2988 wrote to memory of 2784 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2988 wrote to memory of 2784 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2784 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2784 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2784 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Users\Admin\AppData\Roaming\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe

"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp

Files

memory/1612-0-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-1-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-2-0x000000000074E000-0x000000000082E000-memory.dmp

memory/1612-4-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-3-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-5-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-6-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-9-0x0000000000400000-0x000000000082E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe

MD5 6ac60b3f3fc089844b316b8edcb6cbdb
SHA1 b4fc7bfd470f3dc67a3b3a9ddcf2dbd26dcaf2b3
SHA256 657c0d869ee0e44742e138b18533577b7c9bca8d40ffe5b658d80459e4f8f4d9
SHA512 af218350125ea6ab9da68bb2edc7dfbdb023f0fc7ff2c446059d739fccc3891ad1974882275cedd2bf42fbbf2fd9ea50fa2d149a4c5cfbd9a23fa37e29071ecf

memory/1612-24-0x0000000004F50000-0x0000000004F60000-memory.dmp

C:\ProgramData\Synaptics\Synaptics.exe

MD5 46826cf0a3b38a11ec5b0499561e8c83
SHA1 1d027ff751ca85c54562071fcf06f89903807781
SHA256 544deae2250cf2af18927bd25558a889203cb601efa171f15d550cf28f613978
SHA512 451ce4e46c0d21cf93bc2f1d58994b81f4c78c0f9cb4b1f28546d5a52f1a4a50f406cc41f29b904a08e62593d4709b5724eed185a97d6c28e6d07f189aa87953

memory/2652-25-0x0000000000E00000-0x0000000000E0C000-memory.dmp

memory/2988-40-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-39-0x0000000000400000-0x000000000082E000-memory.dmp

memory/1612-47-0x0000000004F50000-0x0000000004F60000-memory.dmp

memory/2436-46-0x0000000001100000-0x000000000110C000-memory.dmp

memory/1612-38-0x00000000066F0000-0x0000000006B1E000-memory.dmp

memory/1612-35-0x00000000066F0000-0x0000000006B1E000-memory.dmp

C:\Users\Admin\Desktop\read_it.txt

MD5 96e58c047ee337ee491fbc24f95405a0
SHA1 00caeea02ff70f1e523a9d618ee22cac3b9cc30b
SHA256 e631d7ac377fb25957aef0cf348a9531682e88fb2c438b9e7ae828182d370419
SHA512 4d902a9c9a7b1b19d5e0d064da928d38c22d221405da9beb370fdef9cba252f8410a96a6d7c4e622cdccb4da1b06a92db8f09d300e7e7dc198068d9e72acb381

memory/2988-115-0x0000000004F90000-0x0000000004FA0000-memory.dmp

memory/2784-120-0x0000000000320000-0x000000000032C000-memory.dmp

memory/2988-122-0x0000000000400000-0x000000000082E000-memory.dmp

memory/2988-123-0x0000000000400000-0x000000000082E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-02 08:23

Reported

2024-07-02 08:24

Platform

win10v2004-20240508-en

Max time kernel

26s

Max time network

28s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\ProgramData\Synaptics\Synaptics.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\svchost.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4584 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 4584 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe
PID 4584 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4584 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4584 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 5004 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 5004 wrote to memory of 2660 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 2892 wrote to memory of 860 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2892 wrote to memory of 860 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2660 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 2660 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\svchost.exe C:\Windows\system32\NOTEPAD.EXE
PID 860 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Users\Admin\AppData\Roaming\svchost.exe
PID 860 wrote to memory of 2200 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Users\Admin\AppData\Roaming\svchost.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe

"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp

Files

memory/4584-2-0x000000000074E000-0x000000000082E000-memory.dmp

memory/4584-1-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-5-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-6-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-4-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-3-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-7-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-8-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-9-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-10-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-11-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4584-14-0x0000000000400000-0x000000000082E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe

MD5 6ac60b3f3fc089844b316b8edcb6cbdb
SHA1 b4fc7bfd470f3dc67a3b3a9ddcf2dbd26dcaf2b3
SHA256 657c0d869ee0e44742e138b18533577b7c9bca8d40ffe5b658d80459e4f8f4d9
SHA512 af218350125ea6ab9da68bb2edc7dfbdb023f0fc7ff2c446059d739fccc3891ad1974882275cedd2bf42fbbf2fd9ea50fa2d149a4c5cfbd9a23fa37e29071ecf

C:\ProgramData\Synaptics\Synaptics.exe

MD5 46826cf0a3b38a11ec5b0499561e8c83
SHA1 1d027ff751ca85c54562071fcf06f89903807781
SHA256 544deae2250cf2af18927bd25558a889203cb601efa171f15d550cf28f613978
SHA512 451ce4e46c0d21cf93bc2f1d58994b81f4c78c0f9cb4b1f28546d5a52f1a4a50f406cc41f29b904a08e62593d4709b5724eed185a97d6c28e6d07f189aa87953

memory/5004-71-0x00000000006E0000-0x00000000006EC000-memory.dmp

memory/5004-110-0x00007FF9F8C03000-0x00007FF9F8C05000-memory.dmp

memory/4584-132-0x0000000000400000-0x000000000082E000-memory.dmp

memory/2892-133-0x0000000000400000-0x000000000082E000-memory.dmp

memory/2892-134-0x0000000000400000-0x000000000082E000-memory.dmp

memory/4536-201-0x00007FF9D6C50000-0x00007FF9D6C60000-memory.dmp

memory/4536-202-0x00007FF9D6C50000-0x00007FF9D6C60000-memory.dmp

memory/4536-203-0x00007FF9D6C50000-0x00007FF9D6C60000-memory.dmp

memory/4536-205-0x00007FF9D6C50000-0x00007FF9D6C60000-memory.dmp

memory/4536-204-0x00007FF9D6C50000-0x00007FF9D6C60000-memory.dmp

memory/4536-206-0x00007FF9D4A70000-0x00007FF9D4A80000-memory.dmp

memory/4536-207-0x00007FF9D4A70000-0x00007FF9D4A80000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\xe2nuCyI.xlsm

MD5 e566fc53051035e1e6fd0ed1823de0f9
SHA1 00bc96c48b98676ecd67e81a6f1d7754e4156044
SHA256 8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512 a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

C:\Users\Admin\Documents\read_it.txt

MD5 96e58c047ee337ee491fbc24f95405a0
SHA1 00caeea02ff70f1e523a9d618ee22cac3b9cc30b
SHA256 e631d7ac377fb25957aef0cf348a9531682e88fb2c438b9e7ae828182d370419
SHA512 4d902a9c9a7b1b19d5e0d064da928d38c22d221405da9beb370fdef9cba252f8410a96a6d7c4e622cdccb4da1b06a92db8f09d300e7e7dc198068d9e72acb381

memory/2892-268-0x0000000000400000-0x000000000082E000-memory.dmp