Analysis

  • max time kernel
    102s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 23:22

General

  • Target

    ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.Designer.cs

  • Size

    39KB

  • MD5

    f98d1b02d270337f4ee19d9b84be3be6

  • SHA1

    75e1b501cb93de121c56b034004525547a488a2c

  • SHA256

    9a1bb05582612566940f20ac7f553c6b41265bed4a5f3c829310dfc512ac82d1

  • SHA512

    66f159acc3228b754c09c1a4ba091b35620a9fc22bf848266ceb4e9cf627d6bf5bc17007cf1162392f9d73578a54f4423eeb22d3b4c2f8e1f4ba5f8fa860b69d

  • SSDEEP

    768:aWK1mkTKny4b6XCIGuHaweQnMql1GMpL1oI4r+NzLfUhUB:a/1mkTKnym6XCIVaEDNzLfUhUB

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\ChaosRansomwareBuilderVersion4-main\Src Code\CustomWindowsForm\BlackForm.Designer.cs"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ChaosRansomwareBuilderVersion4-main\Src Code\CustomWindowsForm\BlackForm.Designer.cs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2df32fc447e30ebc14f52412b0ad70eb

    SHA1

    0ecdf7225651b1a76b91e36bf91bfb04ffed1151

    SHA256

    8a3acbb978a24428fd022e50e981d6bf387974cd2bd8c03d508aa0119281a822

    SHA512

    2b0573aa1f7d11da523b5b1d103ad0cc771689b0f4056559ee52d4f24629b3128d12caf2290871ea9a45dd17c2f40214d6d5b486e00a0e5c80c8eb22e6ab4057