General
-
Target
241204-kctrtayc9k_pw_infected.zip
-
Size
176KB
-
Sample
241205-f8c2qa1kgx
-
MD5
b491c7b5bb485bd5075045d701ce4f2b
-
SHA1
4c054bb053ab134989270b514476af4951a0576c
-
SHA256
f9c4fec8e2c81284647480653b20c97faae25a50f3f2756f6e2b70c8da968d2f
-
SHA512
5f856acd4a640773f9404ac88093557223a775ef96f8e9c1635bfb74ec0a344423147b07135d86a7776379a3ef154ab04e68d5d0d6bf61a492a4c00fd8ff6b35
-
SSDEEP
3072:/k7N6kKi8gBxSukhLWMU/JlRn3Iu3F3G1255A2EKJbu9jiYddh1N2TW+O:MhRl88UQFlRn3IoFW1255AuJaBVdRSJO
Behavioral task
behavioral1
Sample
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\helpme.bat
Targets
-
-
Target
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1
-
Size
417KB
-
MD5
de41c8ac436c2ea1137e7e142fc4a9b5
-
SHA1
df58cda16f1de9ab273009d5f988c281a6650999
-
SHA256
001152ed2a7d84fa5ee2d85e1740c94512e0bc22e0a500d93bfa8a135aaf46e1
-
SHA512
bf7c129bd27808591fcf15ed0d4cddfb22b5580b7f379be884abfc364503d1f69a218ae5adc991f0f20fece57c0a1c92a594d3a01129efa5b8aa7583d2d6dc5a
-
SSDEEP
6144:crZrqFq9eIbJdAS1nqS75MlTrPmsTg8ou0+SRBXcMf1+FnH:X7IbLqS75ozTg8odtRBtenH
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (194) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1