General
-
Target
bee3166e-ee10-4712-aa10-231525ee781c.exe
-
Size
304KB
-
Sample
240802-ber7bs1djh
-
MD5
2fd79512c600edbc47f42f89bbffff48
-
SHA1
02d9621591090f4c15469ecdc7c14360a6d07977
-
SHA256
a5106a4962c79d0edad85a7999939c0eccde0225a68ac5a150e7b4ebfcb360e3
-
SHA512
471299c6b15c8b2cdc74ca04cea7b53d467d0d480dbe467072c276256ea6cd4b0b25744900387221a61465f09119eecda4292f1d4c78afdc01cc61e7d0d1042d
-
SSDEEP
6144:4zWPYSc7LT8VFna9pXysJkIddwXQeYBayx4MRzuKj7q6idKaMAXZFi:4z4s0Fa9IsJ3Fgg4HKjWKaMk7i
Static task
static1
Behavioral task
behavioral1
Sample
bee3166e-ee10-4712-aa10-231525ee781c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bee3166e-ee10-4712-aa10-231525ee781c.exe
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
bee3166e-ee10-4712-aa10-231525ee781c.exe
-
Size
304KB
-
MD5
2fd79512c600edbc47f42f89bbffff48
-
SHA1
02d9621591090f4c15469ecdc7c14360a6d07977
-
SHA256
a5106a4962c79d0edad85a7999939c0eccde0225a68ac5a150e7b4ebfcb360e3
-
SHA512
471299c6b15c8b2cdc74ca04cea7b53d467d0d480dbe467072c276256ea6cd4b0b25744900387221a61465f09119eecda4292f1d4c78afdc01cc61e7d0d1042d
-
SSDEEP
6144:4zWPYSc7LT8VFna9pXysJkIddwXQeYBayx4MRzuKj7q6idKaMAXZFi:4z4s0Fa9IsJ3Fgg4HKjWKaMk7i
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (199) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Deobfuscate/Decode Files or Information
1Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1