General
-
Target
$y monkey.exe
-
Size
5.5MB
-
Sample
250216-e73qbasrdy
-
MD5
be716163be9975a407155df9003080de
-
SHA1
9bf9f4f1822acbe01deab51b62395cbd11f4be0d
-
SHA256
d1686f28ffddfb533160ec00c50f02155ede7c13688754a042e733612b769465
-
SHA512
de6865503fa9004724e5c8f0498d3b167e225ab360bcd496670d2dda489066be49e455d1c482749d708e5e2e6b7d6de181866c487330a71f95f1419f8f4b46f4
-
SSDEEP
49152:rvQP1MmB0+KWntlHv6bMd+aBwuDMCKgumT2f:
Behavioral task
behavioral1
Sample
$y monkey.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
$y monkey.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
$y monkey.exe
-
Size
5.5MB
-
MD5
be716163be9975a407155df9003080de
-
SHA1
9bf9f4f1822acbe01deab51b62395cbd11f4be0d
-
SHA256
d1686f28ffddfb533160ec00c50f02155ede7c13688754a042e733612b769465
-
SHA512
de6865503fa9004724e5c8f0498d3b167e225ab360bcd496670d2dda489066be49e455d1c482749d708e5e2e6b7d6de181866c487330a71f95f1419f8f4b46f4
-
SSDEEP
49152:rvQP1MmB0+KWntlHv6bMd+aBwuDMCKgumT2f:
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1