Resubmissions
21-08-2024 16:23
240821-tvvaqssbrl 1021-08-2024 15:52
240821-ta3rda1blk 1022-01-2022 14:10
220122-rgn6fsbfgr 10Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 16:23
Behavioral task
behavioral1
Sample
666 virus.exe
Resource
win10v2004-20240802-en
General
-
Target
666 virus.exe
-
Size
517KB
-
MD5
df0edf8b66d6a09c96802357d088d31b
-
SHA1
4018b609ef6e77c63c4028a12ca66051379b0633
-
SHA256
3bd7ba1da919719a36e943d1c84a3b976a57d7f4d279b3e81f821f2a5a2e7c40
-
SHA512
ee67b4e8465118b70820c7048620e82799c447d80f5d0dc97162c94ad7ce26ced0f273d6f18601be8cbf8340066755cff131563d4333bbc7258885addbf436db
-
SSDEEP
6144:5r9dgxk4gq1z3PX0VP6NaoME0JKeTl0sVSiQYuOk4aqawwwWQG+DBjwww2Ay:MkVq1z/X0VP6NaoMEQl0xYuPNiG+1A
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral1/memory/2132-1-0x0000000000BA0000-0x0000000000C26000-memory.dmp family_chaos behavioral1/files/0x000500000001da42-6.dat family_chaos -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 666 virus.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4536 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\25bgmdg1f.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4536 svchost.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 2132 666 virus.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2132 666 virus.exe Token: SeDebugPrivilege 4536 svchost.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe 3732 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2132 wrote to memory of 4536 2132 666 virus.exe 94 PID 2132 wrote to memory of 4536 2132 666 virus.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\666 virus.exe"C:\Users\Admin\AppData\Local\Temp\666 virus.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5df0edf8b66d6a09c96802357d088d31b
SHA14018b609ef6e77c63c4028a12ca66051379b0633
SHA2563bd7ba1da919719a36e943d1c84a3b976a57d7f4d279b3e81f821f2a5a2e7c40
SHA512ee67b4e8465118b70820c7048620e82799c447d80f5d0dc97162c94ad7ce26ced0f273d6f18601be8cbf8340066755cff131563d4333bbc7258885addbf436db