General
-
Target
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a
-
Size
96KB
-
Sample
240829-jws4yssgnr
-
MD5
b2692504c14981764eba95b5cda1aac8
-
SHA1
f35d3653f2c166caea51977042877cb6e1544b85
-
SHA256
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a
-
SHA512
66c73af4e0db0463c46bb7443c56eeac1dded76f19d7512be287c944944e753c2db8d4ebe523493f39a70965c27c5c51ec1d44eb286ed70319e775b35cdd2b33
-
SSDEEP
1536:dNpn7Ddnq9VXNlEOr/9bq9q7ExehRN2Qk4BHqhiGgiFMzLPwiSfiKxNXCGEP9jFY:Rndnq9VdMtj
Behavioral task
behavioral1
Sample
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
Targets
-
-
Target
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a
-
Size
96KB
-
MD5
b2692504c14981764eba95b5cda1aac8
-
SHA1
f35d3653f2c166caea51977042877cb6e1544b85
-
SHA256
6e951ec3eefa660258a0e12350e3e477348467f15feb77b71b5a89c73532ce8a
-
SHA512
66c73af4e0db0463c46bb7443c56eeac1dded76f19d7512be287c944944e753c2db8d4ebe523493f39a70965c27c5c51ec1d44eb286ed70319e775b35cdd2b33
-
SSDEEP
1536:dNpn7Ddnq9VXNlEOr/9bq9q7ExehRN2Qk4BHqhiGgiFMzLPwiSfiKxNXCGEP9jFY:Rndnq9VdMtj
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2