General
-
Target
crynox.exe
-
Size
299KB
-
Sample
241214-p8r1baspas
-
MD5
e6e2f46331a60acfc399f10ff842345d
-
SHA1
514945da2f3518753b22df05786e6dce446d7ec1
-
SHA256
c50584f0f5cccb28d192fb2540077792732b8afe1eb887cc3657d60980d9ad02
-
SHA512
08842cb745dc04c6a2f0233b69647502cdc2920c2f520415507b98d54b7086f15282ba177baf93c11fbd6415467f1fb84df5a05a8d1923f47737344b6843333c
-
SSDEEP
3072:drQkc9kuFo+p2afIyTBjMnuNjg710OpYVm/+FbN/damWsJ7gUev+Tvx:95c9Vf2qIuNLiapdz1JMdv+T
Behavioral task
behavioral1
Sample
crynox.exe
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\Decrypt_My_File.txt
https://crynoxaowlkauirfhaaiuefjkebfiaeufaebiefuakbjaiurkjahbfiajkfa.vercel.app/decryptor.html
Targets
-
-
Target
crynox.exe
-
Size
299KB
-
MD5
e6e2f46331a60acfc399f10ff842345d
-
SHA1
514945da2f3518753b22df05786e6dce446d7ec1
-
SHA256
c50584f0f5cccb28d192fb2540077792732b8afe1eb887cc3657d60980d9ad02
-
SHA512
08842cb745dc04c6a2f0233b69647502cdc2920c2f520415507b98d54b7086f15282ba177baf93c11fbd6415467f1fb84df5a05a8d1923f47737344b6843333c
-
SSDEEP
3072:drQkc9kuFo+p2afIyTBjMnuNjg710OpYVm/+FbN/damWsJ7gUev+Tvx:95c9Vf2qIuNLiapdz1JMdv+T
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (178) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1