General
-
Target
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b.exe
-
Size
29KB
-
Sample
241114-ckkvwawpeq
-
MD5
c5a36a4a7e558ad587a7087d72a72c7c
-
SHA1
3edc0fff5092983a4ae664c006dd5a94843eb715
-
SHA256
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b
-
SHA512
c14b21e5e251449c6ad4ea29fc69ec5fc6586e16672d40cf019f6d9d63955d37b972c41b7e5a460a61059bf024647c4b9af7104237a87a96553a0276d6ef6986
-
SSDEEP
384:StWZPzzxAm1vd5VM6YE2r7OUmgIYfdQPFolUOy5o91qqclYhhx82v4:37zxAmhWF/rEgIYw/ho98Ot82Q
Behavioral task
behavioral1
Sample
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b.exe
-
Size
29KB
-
MD5
c5a36a4a7e558ad587a7087d72a72c7c
-
SHA1
3edc0fff5092983a4ae664c006dd5a94843eb715
-
SHA256
1461362ebd3b8710610c59cd2aa00f435330bd9d8f75ba4105617b0205cd932b
-
SHA512
c14b21e5e251449c6ad4ea29fc69ec5fc6586e16672d40cf019f6d9d63955d37b972c41b7e5a460a61059bf024647c4b9af7104237a87a96553a0276d6ef6986
-
SSDEEP
384:StWZPzzxAm1vd5VM6YE2r7OUmgIYfdQPFolUOy5o91qqclYhhx82v4:37zxAmhWF/rEgIYw/ho98Ot82Q
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1