General

  • Target

    bee3166e-ee10-4712-aa10-231525ee781c.exe

  • Size

    304KB

  • Sample

    240802-ber7bs1djh

  • MD5

    2fd79512c600edbc47f42f89bbffff48

  • SHA1

    02d9621591090f4c15469ecdc7c14360a6d07977

  • SHA256

    a5106a4962c79d0edad85a7999939c0eccde0225a68ac5a150e7b4ebfcb360e3

  • SHA512

    471299c6b15c8b2cdc74ca04cea7b53d467d0d480dbe467072c276256ea6cd4b0b25744900387221a61465f09119eecda4292f1d4c78afdc01cc61e7d0d1042d

  • SSDEEP

    6144:4zWPYSc7LT8VFna9pXysJkIddwXQeYBayx4MRzuKj7q6idKaMAXZFi:4z4s0Fa9IsJ3Fgg4HKjWKaMk7i

Malware Config

Targets

    • Target

      bee3166e-ee10-4712-aa10-231525ee781c.exe

    • Size

      304KB

    • MD5

      2fd79512c600edbc47f42f89bbffff48

    • SHA1

      02d9621591090f4c15469ecdc7c14360a6d07977

    • SHA256

      a5106a4962c79d0edad85a7999939c0eccde0225a68ac5a150e7b4ebfcb360e3

    • SHA512

      471299c6b15c8b2cdc74ca04cea7b53d467d0d480dbe467072c276256ea6cd4b0b25744900387221a61465f09119eecda4292f1d4c78afdc01cc61e7d0d1042d

    • SSDEEP

      6144:4zWPYSc7LT8VFna9pXysJkIddwXQeYBayx4MRzuKj7q6idKaMAXZFi:4z4s0Fa9IsJ3Fgg4HKjWKaMk7i

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (199) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Deobfuscate/Decode Files or Information

      Payload decoded via CertUtil.

    • Drops desktop.ini file(s)

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks