Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-02-2025 14:24

General

  • Target

    2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry.exe

  • Size

    26KB

  • MD5

    c97fb12a2cf0c4fc6c0e38451987725f

  • SHA1

    cf78f883f0661d221d2a0351888200ccf7985181

  • SHA256

    4a9d86eabf96dac50beb78e33e188427520c08670053f6599bf374f523906592

  • SHA512

    e7560496328a7a0638b7fceb34b4772ce47b4b314d2c3bedf4775ec961e12ee8f267a6f0429ad20afe51ead8f45329d5f78c7c9f2f604a7b4300c2fd966acf24

  • SSDEEP

    384:9YenjLLA70loMPQ9Ce2OVp91Rk+b5dxDGi:M70lPYSc93k+bTxDN

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 1 IoCs
  • Chaos family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 64 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-17_c97fb12a2cf0c4fc6c0e38451987725f_chaos_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Drops desktop.ini file(s)
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2576
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODA2MjI2OTIzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2224
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\MicrosoftEdge_X64_133.0.3065.69.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4328
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7cbea6a68,0x7ff7cbea6a74,0x7ff7cbea6a80
        3⤵
        • Executes dropped EXE
        PID:3420
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7cbea6a68,0x7ff7cbea6a74,0x7ff7cbea6a80
          4⤵
          • Executes dropped EXE
          PID:4460
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3516
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff648b66a68,0x7ff648b66a74,0x7ff648b66a80
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:980
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff648b66a68,0x7ff648b66a74,0x7ff648b66a80
          4⤵
          • Executes dropped EXE
          PID:652
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:212
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff648b66a68,0x7ff648b66a74,0x7ff648b66a80
          4⤵
          • Executes dropped EXE
          PID:720
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:3732
    • C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe
      "C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1828
    • C:\Windows\system32\wwahost.exe
      "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{0FA5D7FD-5D83-4613-A6B2-DECFC6289D12}\EDGEMITMP_30E3A.tmp\setup.exe

      Filesize

      6.8MB

      MD5

      bdb1aecedc15fc82a63083452dad45c2

      SHA1

      a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb

      SHA256

      4ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f

      SHA512

      50909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d

    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

      Filesize

      3.9MB

      MD5

      4aaa893417cccc147989f876c6a7b295

      SHA1

      b1e35c83518bb275924ead0cd6206bf0c982d30f

      SHA256

      2c38e3c3f18e2d3fb7f04336356b9b5186cabe06b3343beec318ef0def1a9eeb

      SHA512

      109e0c88977fae65a4950fc38393ca32a70d68ef41aeb75b28e6566e0fa626e32e31be38308e7ed5b6a8ba1f56fb5f2133a07aa8bb643224c3dbb089ce9cfd0e

    • C:\Program Files\msedge_installer.log

      Filesize

      73KB

      MD5

      1cd9b954b795cf7d63dcfb514fbe18f2

      SHA1

      41d641ae872d47e5e0c7d9f58bb0091104299319

      SHA256

      54e07fbe557c5e75645935faaabca352c5253c5936539535f1b8247915672bd2

      SHA512

      6562169a1a00190cd417f54892ecf1b8517c44572bf790c1ff0d98396e08f86bda6159d6b420255d49cd499363630e9b9293e6ca3c76dc48fdb7e7854df87593

    • C:\Program Files\msedge_installer.log

      Filesize

      102KB

      MD5

      0320433d4092a530ed5611d679891bf9

      SHA1

      4e47d276a1f456d6246c0c5d332fb0bb8e787b40

      SHA256

      fae1e5c334ae65a9711befdc42d20425c143d74ccc10cf6f4e6ae0d8d94325fb

      SHA512

      95437d65e5a6cf7f6ce6a9fdc29b181378f91896577f8aedb45047f2c189a74d226ad0287ba99c4c8faac012395b150daa841bd9aae0482dc2d365c18df58b1e

    • C:\Program Files\msedge_installer.log

      Filesize

      104KB

      MD5

      2ed3fa58639c349d14654958f6418d06

      SHA1

      7573aebb98e761d018565c1802aae1aa53c59ab5

      SHA256

      977e68371964cad59198a1ba0202e7c2088525ab300e2f77678e902a77dd5971

      SHA512

      67db28a632ae05dd5602b8178f03304369c79161419e650e2214c2ba3acc32a88467388fd7522fd5f8152d67ba0c7b5fe2462ba3dde93840f956bba505b25ba5

    • C:\Users\Admin\AppData\Local\read_it.txt

      Filesize

      964B

      MD5

      4217b8b83ce3c3f70029a056546f8fd0

      SHA1

      487cdb5733d073a0427418888e8f7070fe782a03

      SHA256

      7d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121

      SHA512

      2a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740

    • C:\Users\Admin\AppData\Roaming\DisconnectMeasure.sql

      Filesize

      1B

      MD5

      d1457b72c3fb323a2671125aef3eab5d

      SHA1

      5bab61eb53176449e25c2c82f172b82cb13ffb9d

      SHA256

      8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

      SHA512

      ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

    • C:\Users\All Users\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

      Filesize

      403KB

      MD5

      f2cd4cc59ba8b525dea27ddd35a8ca53

      SHA1

      95d42a4109aed0ddc82271b561f25eda96ed36fc

      SHA256

      47c4884678fca048c3ac48fdd4e6dd10bf6df135393ffc823426aba897544427

      SHA512

      73ade62c10d8f760f53efe7af44805decc174c97782464d620a0daa5347733fde03caaef1dbc8a8c89d19e7ef7da102cef790178f58a88fd3fff5c433a9778f8

    • memory/1828-1348-0x0000027630310000-0x000002763031E000-memory.dmp

      Filesize

      56KB

    • memory/1828-1349-0x00000276307C0000-0x00000276307CA000-memory.dmp

      Filesize

      40KB

    • memory/1828-1350-0x00000276307F0000-0x00000276307F8000-memory.dmp

      Filesize

      32KB

    • memory/1828-1351-0x000002764AC00000-0x000002764AE49000-memory.dmp

      Filesize

      2.3MB

    • memory/4956-1138-0x00007FFBF04C3000-0x00007FFBF04C5000-memory.dmp

      Filesize

      8KB

    • memory/4956-1277-0x00007FFBF04C0000-0x00007FFBF0F81000-memory.dmp

      Filesize

      10.8MB

    • memory/4956-74-0x00007FFBF04C0000-0x00007FFBF0F81000-memory.dmp

      Filesize

      10.8MB

    • memory/4956-1-0x00007FFBF04C3000-0x00007FFBF04C5000-memory.dmp

      Filesize

      8KB

    • memory/4956-0-0x00000000008E0000-0x00000000008EC000-memory.dmp

      Filesize

      48KB