Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2024 02:20

General

  • Target

    3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe

  • Size

    20KB

  • MD5

    392ca2ff27e3fa0d2b4f3f5ec7909d74

  • SHA1

    e90b467ec5949ffd8579841b21ca7dea04d12fe8

  • SHA256

    3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5

  • SHA512

    1af53bdfe7a27e52c3f70004d6df315777051e773e2b56aec983d71ad84c77837e579d043854ac4a34b7402f0f79d844cb75ebae97e57e852b68211912526848

  • SSDEEP

    384:ov3IICuZX+uj3164g/HaqypZjNW6I8V/943bfyHmZM/sSpu5JZZNT:ovYruR+GrgfadowV/9wf8me/sb5L7

Score
10/10

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 1 IoCs
  • Chaos family
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe
    "C:\Users\Admin\AppData\Local\Temp\3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3932-0-0x00007FFF26823000-0x00007FFF26825000-memory.dmp

    Filesize

    8KB

  • memory/3932-1-0x0000000000B50000-0x0000000000B58000-memory.dmp

    Filesize

    32KB

  • memory/3932-2-0x0000000002CB0000-0x0000000002CBE000-memory.dmp

    Filesize

    56KB

  • memory/3932-3-0x00007FFF26820000-0x00007FFF272E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3932-4-0x00007FFF26823000-0x00007FFF26825000-memory.dmp

    Filesize

    8KB

  • memory/3932-5-0x00007FFF26820000-0x00007FFF272E1000-memory.dmp

    Filesize

    10.8MB