Analysis
-
max time kernel
5s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
Encrypter_protected.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Encrypter_protected.exe
Resource
win10v2004-20240508-en
General
-
Target
Encrypter_protected.exe
-
Size
1.9MB
-
MD5
753dd955052999e94e9b4defc316c92d
-
SHA1
49e5fee7f9acc3eb5253744d789ea43dd67b11eb
-
SHA256
dfd96d2413181b137eaa22f2feeda2291f93a99404f327772b52ac98dc5eef60
-
SHA512
e28b03bd990e4d0a500f50a57bfa026c4081374b98d3cad969a941354cf47c0258b23de133c8e3b490a44662aabbca69246e0372c130b868dc421778a0d3b7c8
-
SSDEEP
49152:3DJk+6MbP/ZyRemj4rH3R/Y/4w6wL73WvXyXo:zJpPxysmjCB/YmwuvX6o
Malware Config
Extracted
C:\Users\Admin\Desktop\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 8 IoCs
resource yara_rule behavioral1/memory/1724-9-0x0000000000400000-0x0000000000871000-memory.dmp family_chaos behavioral1/files/0x0029000000015c0f-14.dat family_chaos behavioral1/memory/2608-25-0x0000000000E90000-0x0000000000E9C000-memory.dmp family_chaos behavioral1/memory/1724-37-0x0000000000400000-0x0000000000871000-memory.dmp family_chaos behavioral1/memory/2544-46-0x0000000001000000-0x000000000100C000-memory.dmp family_chaos behavioral1/memory/2164-120-0x0000000000F40000-0x0000000000F4C000-memory.dmp family_chaos behavioral1/memory/2776-122-0x0000000000400000-0x0000000000871000-memory.dmp family_chaos behavioral1/memory/2776-123-0x0000000000400000-0x0000000000871000-memory.dmp family_chaos -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1724 Encrypter_protected.exe 1724 Encrypter_protected.exe 1724 Encrypter_protected.exe 1724 Encrypter_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1120 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1724 Encrypter_protected.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 Encrypter_protected.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"C:\Users\Admin\AppData\Local\Temp\Encrypter_protected.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Encrypter_protected.exe"2⤵PID:2608
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵PID:2544
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt4⤵
- Opens file in notepad (likely ransom note)
PID:1120
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵PID:2164
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵PID:2680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5753dd955052999e94e9b4defc316c92d
SHA149e5fee7f9acc3eb5253744d789ea43dd67b11eb
SHA256dfd96d2413181b137eaa22f2feeda2291f93a99404f327772b52ac98dc5eef60
SHA512e28b03bd990e4d0a500f50a57bfa026c4081374b98d3cad969a941354cf47c0258b23de133c8e3b490a44662aabbca69246e0372c130b868dc421778a0d3b7c8
-
Filesize
22KB
MD56ac60b3f3fc089844b316b8edcb6cbdb
SHA1b4fc7bfd470f3dc67a3b3a9ddcf2dbd26dcaf2b3
SHA256657c0d869ee0e44742e138b18533577b7c9bca8d40ffe5b658d80459e4f8f4d9
SHA512af218350125ea6ab9da68bb2edc7dfbdb023f0fc7ff2c446059d739fccc3891ad1974882275cedd2bf42fbbf2fd9ea50fa2d149a4c5cfbd9a23fa37e29071ecf
-
Filesize
920B
MD596e58c047ee337ee491fbc24f95405a0
SHA100caeea02ff70f1e523a9d618ee22cac3b9cc30b
SHA256e631d7ac377fb25957aef0cf348a9531682e88fb2c438b9e7ae828182d370419
SHA5124d902a9c9a7b1b19d5e0d064da928d38c22d221405da9beb370fdef9cba252f8410a96a6d7c4e622cdccb4da1b06a92db8f09d300e7e7dc198068d9e72acb381