General
-
Target
operative.exe
-
Size
1.2MB
-
Sample
240923-3ethyavdnf
-
MD5
6a8bc83d53a47a0ec1cc68630f20aae2
-
SHA1
08fe5f2cf413274173ce6bd4b2c6b6057a81ed77
-
SHA256
1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
-
SHA512
e3728db0ee56ee1b899ff49a10ed2aedca9e4df15e6ef8786ad8d5d5bfaf251a18e1d04bf0ca239395d69110375ac479a45e699db8f58d1391b9d7caf9ae49dd
-
SSDEEP
24576:qGIqWDuqh8ObW465lbXZAeJWBi++fprWhX5jWvKb6YdgCKttD7+4:gRKqKObWpH8i++4hzmYuttfl
Static task
static1
Behavioral task
behavioral1
Sample
operative.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
operative.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\DECRYPTION INSTRUCTIONS.txt
https://www.coinmama.com
https://www.bitpanda.com
Targets
-
-
Target
operative.exe
-
Size
1.2MB
-
MD5
6a8bc83d53a47a0ec1cc68630f20aae2
-
SHA1
08fe5f2cf413274173ce6bd4b2c6b6057a81ed77
-
SHA256
1aeea420fd7ad08f55a074277be26a36a98959a78da830c5ad6cee38c002cdf6
-
SHA512
e3728db0ee56ee1b899ff49a10ed2aedca9e4df15e6ef8786ad8d5d5bfaf251a18e1d04bf0ca239395d69110375ac479a45e699db8f58d1391b9d7caf9ae49dd
-
SSDEEP
24576:qGIqWDuqh8ObW465lbXZAeJWBi++fprWhX5jWvKb6YdgCKttD7+4:gRKqKObWpH8i++4hzmYuttfl
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (195) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1