General
-
Target
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345cN
-
Size
777KB
-
Sample
241006-fygxxstcnk
-
MD5
d570b2529c442ad6b2c51a727a580800
-
SHA1
b95185702eb795a6f1e36c1ef6e6fb55ea4b2a17
-
SHA256
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345c
-
SHA512
954d0b529441c4654237da996a69a9e609f66a56f35bb831e356bcf1119401061d287c6e88f658668c6d7fb78db19bb7f4b267ec07231a7020d66c5dff3a5eb3
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9tnIj:SnsJ39LyjbJkQFMhmC+6GD99o
Behavioral task
behavioral1
Sample
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345cN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Links\READ_THIS.txt
chaos
Targets
-
-
Target
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345cN
-
Size
777KB
-
MD5
d570b2529c442ad6b2c51a727a580800
-
SHA1
b95185702eb795a6f1e36c1ef6e6fb55ea4b2a17
-
SHA256
863809b03627315676be588f4027d45989029eb627e7361adbada53adb44345c
-
SHA512
954d0b529441c4654237da996a69a9e609f66a56f35bb831e356bcf1119401061d287c6e88f658668c6d7fb78db19bb7f4b267ec07231a7020d66c5dff3a5eb3
-
SSDEEP
12288:SMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9tnIj:SnsJ39LyjbJkQFMhmC+6GD99o
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1