General
-
Target
2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry
-
Size
26KB
-
Sample
250217-rqv1cszlfz
-
MD5
c97fb12a2cf0c4fc6c0e38451987725f
-
SHA1
cf78f883f0661d221d2a0351888200ccf7985181
-
SHA256
4a9d86eabf96dac50beb78e33e188427520c08670053f6599bf374f523906592
-
SHA512
e7560496328a7a0638b7fceb34b4772ce47b4b314d2c3bedf4775ec961e12ee8f267a6f0429ad20afe51ead8f45329d5f78c7c9f2f604a7b4300c2fd966acf24
-
SSDEEP
384:9YenjLLA70loMPQ9Ce2OVp91Rk+b5dxDGi:M70lPYSc93k+bTxDN
Behavioral task
behavioral1
Sample
2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry
-
Size
26KB
-
MD5
c97fb12a2cf0c4fc6c0e38451987725f
-
SHA1
cf78f883f0661d221d2a0351888200ccf7985181
-
SHA256
4a9d86eabf96dac50beb78e33e188427520c08670053f6599bf374f523906592
-
SHA512
e7560496328a7a0638b7fceb34b4772ce47b4b314d2c3bedf4775ec961e12ee8f267a6f0429ad20afe51ead8f45329d5f78c7c9f2f604a7b4300c2fd966acf24
-
SSDEEP
384:9YenjLLA70loMPQ9Ce2OVp91Rk+b5dxDGi:M70lPYSc93k+bTxDN
-
Chaos Ransomware
-
Chaos family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1