General
-
Target
sample
-
Size
19KB
-
Sample
240906-fzzt5aybpm
-
MD5
54e88b891cf2c631f409f6885f3c7786
-
SHA1
4431495eaeefe61cb050b0e53e8cc222ce4e32b2
-
SHA256
f2d23d431e0fcff74904c0f1af74994a2f94d0e51b597b9eef97f2883e058c0c
-
SHA512
9a9d1ea34bacc096646c601e75b1647bdb1030af8d09c1908bd2c968388970edc2837d553d0a85fe993a39827243d68072dc7f023cac1c99c5e2c8cff5740078
-
SSDEEP
384:3M3spa1ocy494lbGa8MvhpNogG4Kyn2MFV1EY04TolJftn1xCejiw:3m1ocy4uEaPJpNdGJyFTEY04TolxLxPF
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
sample
-
Size
19KB
-
MD5
54e88b891cf2c631f409f6885f3c7786
-
SHA1
4431495eaeefe61cb050b0e53e8cc222ce4e32b2
-
SHA256
f2d23d431e0fcff74904c0f1af74994a2f94d0e51b597b9eef97f2883e058c0c
-
SHA512
9a9d1ea34bacc096646c601e75b1647bdb1030af8d09c1908bd2c968388970edc2837d553d0a85fe993a39827243d68072dc7f023cac1c99c5e2c8cff5740078
-
SSDEEP
384:3M3spa1ocy494lbGa8MvhpNogG4Kyn2MFV1EY04TolJftn1xCejiw:3m1ocy4uEaPJpNdGJyFTEY04TolxLxPF
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
3File Deletion
3Modify Registry
3Pre-OS Boot
1Bootkit
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1