Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 01:22

General

  • Target

    a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0.exe

  • Size

    417KB

  • MD5

    3dc9bad7720a01598aa14e55baca7413

  • SHA1

    99668a82a34ec17340fccecbc2ef0985b84704a0

  • SHA256

    a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0

  • SHA512

    567581747132d56595c719e4d454bf6e73ba941581701b28287559f899ea5813a0abb7ff2df25cb3d7c99d3203c8a8ab361ea37b3b8e8392748fb855ee4cbaba

  • SSDEEP

    6144:Jr9Zzp4MmFrxodIFRfiM6baHcgrRS8gPFYTdOjbGXypU5:Jp4MmxxhfiMzcyRQFYTdqTa

Malware Config

Extracted

Path

C:\Users\Admin\Documents\welp.txt

Ransom Note
Hello there! All your files are encrypted, but do not worry, if you're not poor that is. If you send us 50$ worth of Bitcoin, you will get a key that will decrypt all your files! Yipeeeee! Contact us at [email protected] After you send the $50 worth of BTC to the wallet, you will receive the key. Don't try to use any third party software to decrypt your files if you don't want to lose all your data.

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0.exe
    "C:\Users\Admin\AppData\Local\Temp\a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Users\Admin\AppData\Roaming\quantum.exe
      "C:\Users\Admin\AppData\Roaming\quantum.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\welp.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\quantum.exe

          Filesize

          417KB

          MD5

          3dc9bad7720a01598aa14e55baca7413

          SHA1

          99668a82a34ec17340fccecbc2ef0985b84704a0

          SHA256

          a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0

          SHA512

          567581747132d56595c719e4d454bf6e73ba941581701b28287559f899ea5813a0abb7ff2df25cb3d7c99d3203c8a8ab361ea37b3b8e8392748fb855ee4cbaba

        • C:\Users\Admin\Documents\welp.txt

          Filesize

          427B

          MD5

          025e685a33afef1bb7772b41f46d5700

          SHA1

          39c246daf9003a7a38cfb2edb5f66b2766c65c39

          SHA256

          fc4d2fe0b5c84f7ffa475e1cf9da6185e8bb162a03899bcfe015df64778cc380

          SHA512

          1d3d29da8bb4390ebe563e046d382ced7e1d4abb7870f4a7bee64683d3ae236375492b7ad7fb3e64c800859cf80da43406243f2e5bd36bc262e7bff1e5168b29

        • memory/328-0-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

          Filesize

          4KB

        • memory/328-1-0x0000000000220000-0x000000000028E000-memory.dmp

          Filesize

          440KB

        • memory/2116-7-0x0000000001050000-0x00000000010BE000-memory.dmp

          Filesize

          440KB

        • memory/2116-9-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2116-10-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2116-513-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

          Filesize

          9.9MB