Resubmissions

13/07/2024, 09:54 UTC

240713-lxbx6swdmm 10

13/07/2024, 09:50 UTC

240713-lvbvdsyapd 10

13/07/2024, 09:46 UTC

240713-lr1dksyajd 10

Analysis

  • max time kernel
    840s
  • max time network
    842s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 09:50 UTC

General

  • Target

    2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1.exe

  • Size

    283KB

  • MD5

    f5a0c315b535c5a65bbbad8352592221

  • SHA1

    97e4cff4bece35cbcea863045025645f931fce14

  • SHA256

    2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1

  • SHA512

    58560e1f409fb5cbd70517594d47d2e6145b17d3e64170ef6c1ae583cdf59fe670c2f1c468733ecca0a99c8ec893426a6ca9a8263be12a8845e87af3be50d335

  • SSDEEP

    3072:4W2W9AU+AUae0RgBhr2TLJY74vSePjxi4vLE3YKFcLhNLUt/sVZuQ5kROFz8C9uk:4jW9/+AGBOLS4cvIpNYqa6kIFzn9/x

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\read_it.txt

Ransom Note
-‐--‐ ◇ ATTENTION BRUH ◇ ----- YOUR ALL FILES HAVE BEEN ENCRYPTED ! IT'S A RANSOMWARE ATTACK , ALL YOUR FILES DOCUMENTS PDF VEDIOS IMAGE'S EXE FILES TXT FILES ALL ARE ENCRYPTED. WHAT YOU DO FOR DECRYPT FILES ? = JUST COME IN TELEGRAM AND PAY 150$ FOR YOUR DECRYPTOR AND GET BACK YOUR FILES NORMAL. PAYMENT METHODS :- BTC , ETH , LTC TELEGRAM LINK :- https://t.me/+CaD1Kgd5Hj9mM2E9 COME FIRST HAPPY JOURNEY........
URLs

https://t.me/+CaD1Kgd5Hj9mM2E9

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1.exe
    "C:\Users\Admin\AppData\Local\Temp\2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab

    Filesize

    1B

    MD5

    d1457b72c3fb323a2671125aef3eab5d

    SHA1

    5bab61eb53176449e25c2c82f172b82cb13ffb9d

    SHA256

    8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

    SHA512

    ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

  • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\read_it.txt

    Filesize

    449B

    MD5

    3e892097785178c6b685b4f8d425c71a

    SHA1

    e8edaf757b2078f40fa7597f51b1aedded9016ba

    SHA256

    5383a8da410d702429721bb7fdfa0521faaafac21e08834390da7fec4bb65217

    SHA512

    88e0340dfc5980ebb3219d58f261363c7866d06f8fdf7f85f4fa08303079073510b18b2f562a0deccd7e173788c1984d05c041ae6639e8bb68473677f9a375f5

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    283KB

    MD5

    f5a0c315b535c5a65bbbad8352592221

    SHA1

    97e4cff4bece35cbcea863045025645f931fce14

    SHA256

    2e9e18954a73762ae06eaa6fa85c4dbdabf607fee4ec2ed016a689c7173dbfd1

    SHA512

    58560e1f409fb5cbd70517594d47d2e6145b17d3e64170ef6c1ae583cdf59fe670c2f1c468733ecca0a99c8ec893426a6ca9a8263be12a8845e87af3be50d335

  • memory/2692-0-0x000007FEF5CB3000-0x000007FEF5CB4000-memory.dmp

    Filesize

    4KB

  • memory/2692-1-0x0000000000880000-0x00000000008CC000-memory.dmp

    Filesize

    304KB

  • memory/2740-7-0x0000000000E40000-0x0000000000E8C000-memory.dmp

    Filesize

    304KB

  • memory/2740-15-0x000007FEF5CB0000-0x000007FEF669C000-memory.dmp

    Filesize

    9.9MB

  • memory/2740-14-0x000007FEF5CB0000-0x000007FEF669C000-memory.dmp

    Filesize

    9.9MB

  • memory/2740-1175-0x000007FEF5CB0000-0x000007FEF669C000-memory.dmp

    Filesize

    9.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.