Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-10-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
civilization.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
civilization.exe
Resource
win10v2004-20241007-en
General
-
Target
civilization.exe
-
Size
855KB
-
MD5
01aab4b68ae82f586d0bb732cda779ef
-
SHA1
b5aad89b869731db2ce4b9996d1a96fafeec4fb8
-
SHA256
5f9236f38f5ea90adbb576709f7f5b853a5a3eaa47c720e10b29db902eefbdde
-
SHA512
3e0355f9f075badac4ab0777a5beda8721b5db9fd1ce3ce76d6081d50bfbd5f93cdce3001a790903eaf4bd182a93ad43fc22aa34088f70c7565219ebbe9d5593
-
SSDEEP
24576:6zqrH/2j3ngtG31FQF2KVhmDHim3kVRw4RfH0k:6zqrH+gtGFqopDHixAyH0k
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral1/files/0x000c00000001225c-5.dat family_chaos behavioral1/memory/2240-17-0x0000000000B60000-0x0000000000B70000-memory.dmp family_chaos -
Chaos family
-
Executes dropped EXE 3 IoCs
pid Process 2240 Virus1.exe 1260 Bootstrapper.exe 1268 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 3024 civilization.exe 3024 civilization.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language civilization.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2864 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 Virus1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 Virus1.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2240 3024 civilization.exe 29 PID 3024 wrote to memory of 2240 3024 civilization.exe 29 PID 3024 wrote to memory of 2240 3024 civilization.exe 29 PID 3024 wrote to memory of 2240 3024 civilization.exe 29 PID 3024 wrote to memory of 1260 3024 civilization.exe 30 PID 3024 wrote to memory of 1260 3024 civilization.exe 30 PID 3024 wrote to memory of 1260 3024 civilization.exe 30 PID 3024 wrote to memory of 1260 3024 civilization.exe 30 PID 1260 wrote to memory of 2772 1260 Bootstrapper.exe 32 PID 1260 wrote to memory of 2772 1260 Bootstrapper.exe 32 PID 1260 wrote to memory of 2772 1260 Bootstrapper.exe 32 PID 2772 wrote to memory of 2864 2772 cmd.exe 34 PID 2772 wrote to memory of 2864 2772 cmd.exe 34 PID 2772 wrote to memory of 2864 2772 cmd.exe 34 PID 2240 wrote to memory of 3036 2240 Virus1.exe 35 PID 2240 wrote to memory of 3036 2240 Virus1.exe 35 PID 2240 wrote to memory of 3036 2240 Virus1.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\civilization.exe"C:\Users\Admin\AppData\Local\Temp\civilization.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Virus1.exe"C:\Users\Admin\AppData\Roaming\Virus1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2240 -s 5683⤵PID:3036
-
-
-
C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"C:\Users\Admin\AppData\Roaming\Bootstrapper.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\system32\cmd.exe"cmd" /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD52a4dcf20b82896be94eb538260c5fb93
SHA121f232c2fd8132f8677e53258562ad98b455e679
SHA256ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a
SHA5124f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288
-
Filesize
42KB
MD59fd5152a920afc01a494f84d97af7b8c
SHA1058646770a0ca82417f240a068464e712c11a1b9
SHA2566f0f20da34396166df352bf301b3c59ef42b0bc67f52af3d541b0161c47ede05
SHA5123bc11f2d30877590f108866186a0dbc4d36a773b036382df7b5129637e81c70f18469526ef2129a02e36179075a58f93e7e0040fd35c8c0d88511b77998d53b6