Analysis

  • max time kernel
    138s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 10:13

General

  • Target

    Chucky.exe

  • Size

    181KB

  • MD5

    4490880e581ac1f7bee0b37136304af9

  • SHA1

    e3916209ca93d0425a974cc47c31dcb5887b8428

  • SHA256

    b88c6dd5815cb65b0b813e6369da9114d512bd6088a42f941c17d4048cffa864

  • SHA512

    76d246821f50b6108f9b8fcccd5915db5b9735387af8e917a8826e96544f1f94c0deac8c1781eb0864e091dd471d77dbf9bab8403e77c5184ef263d9a0c4f7fe

  • SSDEEP

    3072:J3kAEgr9iA72FNYdW5Z6bdur+eoyN5Ltolk/fC2KbnRZ5e3XHo6vQsoLzCs:vr9iBIoIZqJW0fdKDROHHo8eLzC

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\PLZ READ!.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chucky.exe
    "C:\Users\Admin\AppData\Local\Temp\Chucky.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\PLZ READ!.txt
      2⤵
        PID:2800
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:1
      1⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Program Files (x86)\Windows Media Player\wmpshare.exe
        "C:\Program Files (x86)\Windows Media Player\wmpshare.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1928
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2459758,0x7fef2459768,0x7fef2459778
        2⤵
          PID:2836
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:2
          2⤵
            PID:1948
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:8
            2⤵
              PID:1856
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:8
              2⤵
                PID:2024
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:1
                2⤵
                  PID:396
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:1
                  2⤵
                    PID:2892
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:2
                    2⤵
                      PID:2140
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1268 --field-trial-handle=1224,i,16865144853100608782,8477838820223393018,131072 /prefetch:1
                      2⤵
                        PID:2968
                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                      1⤵
                        PID:296
                      • C:\Windows\system32\taskmgr.exe
                        "C:\Windows\system32\taskmgr.exe" /4
                        1⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2604
                      • C:\Windows\explorer.exe
                        "C:\Windows\explorer.exe"
                        1⤵
                          PID:2220
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\system32\cmd.exe"
                          1⤵
                            PID:2020
                            • C:\Windows\system32\control.exe
                              control pnel
                              2⤵
                                PID:2712
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL pnel
                                  3⤵
                                    PID:1768
                                • C:\Windows\system32\control.exe
                                  control panel
                                  2⤵
                                    PID:2344
                                • C:\Windows\SysWOW64\DllHost.exe
                                  C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                  1⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:688

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\8abb7f98-6ec2-45dd-b49b-5d961ab0ad8b.tmp

                                  Filesize

                                  154KB

                                  MD5

                                  2b5d774f3be1f79326363a671f4a4950

                                  SHA1

                                  b5fafc5e5e87127acbee9ee0bc3e5521829dccd1

                                  SHA256

                                  77459bfbc72a576298f864058dd42b013dc595fb0db27651ec729e07088b893c

                                  SHA512

                                  75126c8319579f43d21692e350453fc41a03a49b2bf1fdfe67aefb94adef929ba1c7a75823d4b2411ab34aefadfba6269e674504d1f15771ca3d9400e5e535ad

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Temp\Chucky.exe

                                  Filesize

                                  181KB

                                  MD5

                                  4490880e581ac1f7bee0b37136304af9

                                  SHA1

                                  e3916209ca93d0425a974cc47c31dcb5887b8428

                                  SHA256

                                  b88c6dd5815cb65b0b813e6369da9114d512bd6088a42f941c17d4048cffa864

                                  SHA512

                                  76d246821f50b6108f9b8fcccd5915db5b9735387af8e917a8826e96544f1f94c0deac8c1781eb0864e091dd471d77dbf9bab8403e77c5184ef263d9a0c4f7fe

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms~RFf772c4e.TMP

                                  Filesize

                                  1KB

                                  MD5

                                  63ddd09f2557a4b25f81d258270daa2e

                                  SHA1

                                  9feb42878833332502bca122b56b6c854e2c5e7e

                                  SHA256

                                  7456831eb97bcd8f921b66da527ac4a2d6ecf2e54a00fb4390f89a803810040c

                                  SHA512

                                  1352dc7d6638a41dd82fbb97bd13488a8e3704e19d8b95bea59eac5beb007be88af2c757fffd517b0d800fc93c3e5b27e5d87dea8b6c54594e76258014d5f784

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Chucky.url

                                  Filesize

                                  146B

                                  MD5

                                  c2e1e46779833dafb04823db6d9d7ef4

                                  SHA1

                                  db4b67182402b9c7ab13fb741f6ba3e5451e3aef

                                  SHA256

                                  5007bdce92eec4e06f64a0b6cf6e236fe89e144fad13aac9a90c90db30ab2c1f

                                  SHA512

                                  a2b1f07a59aababbda02c2e84ec7a8bd8fe62baf244bee7a39926d21680c0e6107103734bdce0e53cc6e4e6c288337336aafb8dffe22c85bf1b2b6579880671b

                                • C:\Users\Admin\Desktop\PLZ READ!.txt

                                  Filesize

                                  964B

                                  MD5

                                  4217b8b83ce3c3f70029a056546f8fd0

                                  SHA1

                                  487cdb5733d073a0427418888e8f7070fe782a03

                                  SHA256

                                  7d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121

                                  SHA512

                                  2a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740

                                • memory/2556-70-0x000007FEF5C73000-0x000007FEF5C74000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2556-71-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2556-0-0x000007FEF5C73000-0x000007FEF5C74000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2556-216-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2556-69-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2556-1-0x0000000000C30000-0x0000000000C64000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/2604-214-0x0000000140000000-0x00000001405E8000-memory.dmp

                                  Filesize

                                  5.9MB

                                • memory/2604-215-0x0000000140000000-0x00000001405E8000-memory.dmp

                                  Filesize

                                  5.9MB