Overview
overview
10Static
static
10ChaosRanso...in.zip
windows7-x64
1ChaosRanso...in.zip
windows10-2004-x64
1ChaosRanso...ICENSE
windows7-x64
1ChaosRanso...ICENSE
windows10-2004-x64
1ChaosRanso...DME.md
windows7-x64
3ChaosRanso...DME.md
windows10-2004-x64
3ChaosRanso...csproj
windows7-x64
3ChaosRanso...csproj
windows10-2004-x64
3ChaosRanso...v4.ico
windows7-x64
1ChaosRanso...v4.ico
windows10-2004-x64
3ChaosRanso...v4.sln
windows7-x64
3ChaosRanso...v4.sln
windows10-2004-x64
3ChaosRanso...ner.cs
windows7-x64
3ChaosRanso...ner.cs
windows10-2004-x64
3ChaosRanso...orm.cs
windows7-x64
3ChaosRanso...orm.cs
windows10-2004-x64
3ChaosRanso...ources
windows7-x64
3ChaosRanso...ources
windows10-2004-x64
3ChaosRanso...nX.vbs
windows7-x64
1ChaosRanso...nX.vbs
windows10-2004-x64
1ChaosRanso...nZ.vbs
windows7-x64
1ChaosRanso...nZ.vbs
windows10-2004-x64
1ChaosRanso...ler.cs
windows7-x64
3ChaosRanso...ler.cs
windows10-2004-x64
3ChaosRanso...ner.cs
windows7-x64
3ChaosRanso...ner.cs
windows10-2004-x64
3ChaosRanso...rm2.cs
windows7-x64
3ChaosRanso...rm2.cs
windows10-2004-x64
3ChaosRanso...ources
windows7-x64
3ChaosRanso...ources
windows10-2004-x64
3ChaosRanso...on.vbs
windows7-x64
1ChaosRanso...on.vbs
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 23:22
Behavioral task
behavioral1
Sample
ChaosRansomwareBuilderVersion4-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ChaosRansomwareBuilderVersion4-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ChaosRansomwareBuilderVersion4-main/LICENSE
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
ChaosRansomwareBuilderVersion4-main/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ChaosRansomwareBuilderVersion4-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
ChaosRansomwareBuilderVersion4-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.csproj
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.csproj
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.ico
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.sln
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/Chaos Ransomware Builder v4.sln
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.Designer.cs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.Designer.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.cs
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.resources
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/BlackForm.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/ButtonX.vbs
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/ButtonX.vbs
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/ButtonZ.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/ButtonZ.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Compiler.cs
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Compiler.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.Designer.cs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.Designer.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.cs
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.resources
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.resources
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/MinMaxButton.vbs
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/MinMaxButton.vbs
Resource
win10v2004-20240802-en
General
-
Target
ChaosRansomwareBuilderVersion4-main/Src Code/CustomWindowsForm/Form2.resources
-
Size
786B
-
MD5
a0f297d650059197ea79c4e102f4bd91
-
SHA1
f7d100548c2f1412b92140430c612b4d50bae847
-
SHA256
f93baead1ad6a261359ae10d1a12365dbe4feacc1c941ad977cb3675e34669cd
-
SHA512
d72481e1a11ceb61d5e911a21f447dda7b8c43c8724f7066eefb26f7f4d307c6dda9cc4e9442e6312c3d4fe2458ace8b198463ef93d14c0bb7667c46da0634dd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.resources rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\.resources\ = "resources_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\resources_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 272 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 272 AcroRd32.exe 272 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2924 2140 cmd.exe 31 PID 2140 wrote to memory of 2924 2140 cmd.exe 31 PID 2140 wrote to memory of 2924 2140 cmd.exe 31 PID 2924 wrote to memory of 272 2924 rundll32.exe 32 PID 2924 wrote to memory of 272 2924 rundll32.exe 32 PID 2924 wrote to memory of 272 2924 rundll32.exe 32 PID 2924 wrote to memory of 272 2924 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ChaosRansomwareBuilderVersion4-main\Src Code\CustomWindowsForm\Form2.resources"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ChaosRansomwareBuilderVersion4-main\Src Code\CustomWindowsForm\Form2.resources2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ChaosRansomwareBuilderVersion4-main\Src Code\CustomWindowsForm\Form2.resources"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b703b635c863ff85690a4f02a1ead23
SHA12a3d4b1ad9df64eb0a6876bd334653f91a0a65fa
SHA256e3aabae087e64f5b170d310e16c38d241e65df93c6cdddb1237cac96f766a546
SHA512638c10fcbb0627cc047fcbd1e78fee846692dabad5c06f5cdf4b0a3dec657d760494dd5306e7c6f4a150b5bc397c8bd4b7ab08c95da93954d71613a3e58a1720