General
-
Target
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2
-
Size
27KB
-
Sample
240827-x965maxhjd
-
MD5
12964292654b711b26b0039661181e7b
-
SHA1
37b01028df0a60e9f945776f14b6f44f1980061f
-
SHA256
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2
-
SHA512
19bb5a23832acff3bba40f31655b9cf604dadd1f92c8af4e9ccf480c9f39947fb8177ecae43e3f642b2fac82e7afda65afd2d38ed0c31e0a135374f21b9d55ad
-
SSDEEP
384:QtWZPzzxAm1vp5ZRoDNhvLKeOS2NiCXlROy5o91+WSFpQ082v5:l7zxAmpfyzeeOSSi2ho9wWSFb82R
Behavioral task
behavioral1
Sample
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\read_it.txt
Targets
-
-
Target
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2
-
Size
27KB
-
MD5
12964292654b711b26b0039661181e7b
-
SHA1
37b01028df0a60e9f945776f14b6f44f1980061f
-
SHA256
aa62ff9d44c493287764f1efa85f236c2d633d68724d907279709559b56572d2
-
SHA512
19bb5a23832acff3bba40f31655b9cf604dadd1f92c8af4e9ccf480c9f39947fb8177ecae43e3f642b2fac82e7afda65afd2d38ed0c31e0a135374f21b9d55ad
-
SSDEEP
384:QtWZPzzxAm1vp5ZRoDNhvLKeOS2NiCXlROy5o91+WSFpQ082v5:l7zxAmpfyzeeOSSi2ho9wWSFb82R
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1