Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe
Resource
win10v2004-20241007-en
General
-
Target
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe
-
Size
20KB
-
MD5
392ca2ff27e3fa0d2b4f3f5ec7909d74
-
SHA1
e90b467ec5949ffd8579841b21ca7dea04d12fe8
-
SHA256
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5
-
SHA512
1af53bdfe7a27e52c3f70004d6df315777051e773e2b56aec983d71ad84c77837e579d043854ac4a34b7402f0f79d844cb75ebae97e57e852b68211912526848
-
SSDEEP
384:ov3IICuZX+uj3164g/HaqypZjNW6I8V/943bfyHmZM/sSpu5JZZNT:ovYruR+GrgfadowV/9wf8me/sb5L7
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3932-2-0x0000000002CB0000-0x0000000002CBE000-memory.dmp family_chaos -
Chaos family
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exepid process 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exepid process 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exedescription pid process Token: SeDebugPrivilege 3932 3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe"C:\Users\Admin\AppData\Local\Temp\3e96709bb940d80b4ffe950fa589fff66fbf84eb752de49f115bc51c28e179f5.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932