General
-
Target
sorry.exe
-
Size
508KB
-
Sample
250216-fgyt4stmcy
-
MD5
9ab2affe7c7eb0d1b95ccf4216d7d972
-
SHA1
902113db29be4f88cb61b93145dc09bbd0ca2690
-
SHA256
288f536597498859b243ab7c280b08fda04c1d29230334a62654daf56e7fa70a
-
SHA512
ce44e83b8296c6bf5e867cfdfe08eacfebea20ba09e91d9c1859ec47af4634ca932392a00299c8555ec7fbd5d39230c7987aaa4d6a725fde24d4497b0679aa31
-
SSDEEP
12288:m4rJa124PiPzOvVTp0e6qD7dxYOo10n8GxQmTRTE9hoyi8r7IK6Bww5:m73E+EAKa
Behavioral task
behavioral1
Sample
sorry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sorry.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
sorry.exe
-
Size
508KB
-
MD5
9ab2affe7c7eb0d1b95ccf4216d7d972
-
SHA1
902113db29be4f88cb61b93145dc09bbd0ca2690
-
SHA256
288f536597498859b243ab7c280b08fda04c1d29230334a62654daf56e7fa70a
-
SHA512
ce44e83b8296c6bf5e867cfdfe08eacfebea20ba09e91d9c1859ec47af4634ca932392a00299c8555ec7fbd5d39230c7987aaa4d6a725fde24d4497b0679aa31
-
SSDEEP
12288:m4rJa124PiPzOvVTp0e6qD7dxYOo10n8GxQmTRTE9hoyi8r7IK6Bww5:m73E+EAKa
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1