File name: | Encrypt.exe |
Full analysis: | https://app.any.run/tasks/938b9950-8242-418f-a7ef-bdabb9c46d7c |
Verdict: | Malicious activity |
Threats: | Chaos ransomware is a malware family known for its destructive capabilities and diverse variants. It first appeared in 2021 as a ransomware builder and later acted as a wiper. Unlike most ransomware strains that encrypt data to extort payment, early Chaos variants permanently corrupted files, while later versions adopted more conventional encryption techniques. |
Analysis date: | September 15, 2024, 10:12:53 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 8728BA233FCB020A6A2EAABB90DF630C |
SHA1: | C6DC576F2E0423E8A0F36BBA51FA7C65E1E281E7 |
SHA256: | B15052D17AFC1A01E83CDC0624DD268838237F8CD66FA12C56706BDEE8A61286 |
SSDEEP: | 24576:53HzLnqOaNMCFJ6kPvOxrcg0i7uFCbU4+Il2L1ywdst:53HzLnqOaNMCFJ6kPvO1cg0i7rPmst |
.exe | | | Win32 Executable Borland Delphi 7 (96.4) |
---|---|---|
.exe | | | Win32 Executable Delphi generic (2) |
.exe | | | Win32 Executable (generic) (0.6) |
.exe | | | Win16/32 Executable Delphi generic (0.3) |
.exe | | | Generic Win/DOS Executable (0.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 1992:06:19 22:22:17+00:00 |
ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 629760 |
InitializedDataSize: | 677888 |
UninitializedDataSize: | - |
EntryPoint: | 0x9ab80 |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 1.0.0.0 |
ProductVersionNumber: | 1.0.0.0 |
FileFlagsMask: | 0x0000 |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Chinese (Simplified) |
CharacterSet: | Unicode |
FileVersion: | 1.0.0.0 |
FileDescription: | 易语言程序 |
ProductName: | 易语言程序 |
ProductVersion: | 1.0.0.0 |
LegalCopyright: | 作者版权所有 请尊重并使用正版 |
Comments: | 本程序使用易语言编写(http://www.eyuyan.com) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
752 | bcdedit /set {default} bootstatuspolicy ignoreallfailures | C:\Windows\System32\bcdedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Boot Configuration Data Editor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1568 | "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet | C:\Windows\System32\cmd.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2384 | "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no | C:\Windows\System32\cmd.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2572 | C:\WINDOWS\System32\vdsldr.exe -Embedding | C:\Windows\System32\vdsldr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Virtual Disk Service Loader Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
2720 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3908 | vssadmin delete shadows /all /quiet | C:\Windows\System32\vssadmin.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® Volume Shadow Copy Service Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3964 | "C:\Users\admin\Desktop\Encrypt.exe" | C:\Users\admin\Desktop\Encrypt.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: 易语言程序 Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
4436 | wbadmin delete catalog -quiet | C:\Windows\System32\wbadmin.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Command Line Interface for Microsoft® BLB Backup Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4540 | "C:\Users\admin\AppData\Roaming\svchost.exe" | C:\Users\admin\AppData\Roaming\svchost.exe | ._cache_Encrypt.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Version: 0.0.0.0 Modules
| |||||||||||||||
5140 | bcdedit /set {default} recoveryenabled no | C:\Windows\System32\bcdedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Boot Configuration Data Editor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (3964) Encrypt.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
(PID) Process: | (3964) Encrypt.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | ????? |
Value: C:\ProgramData\Synaptics\Synaptics.exe | |||
(PID) Process: | (4540) svchost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | UpdateTask |
Value: C:\Users\admin\AppData\Roaming\svchost.exe | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001 |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001 |
Operation: | write | Name: | Element |
Value: 0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000 | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
Operation: | write | Name: | Element |
Value: \EFI\Microsoft\Boot\bootmgfw.efi | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001 |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001 |
Operation: | write | Name: | Element |
Value: 0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000 | |||
(PID) Process: | (752) bcdedit.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\12000002 |
Operation: | delete key | Name: | (default) |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
3964 | Encrypt.exe | C:\ProgramData\Synaptics\Synaptics.exe | executable | |
MD5:8728BA233FCB020A6A2EAABB90DF630C | SHA256:B15052D17AFC1A01E83CDC0624DD268838237F8CD66FA12C56706BDEE8A61286 | |||
3964 | Encrypt.exe | C:\Users\admin\Desktop\._cache_Encrypt.exe | executable | |
MD5:E7D91103647B76F121B854FE806F80E2 | SHA256:04ED744D9643830FC5F0499203A6FDE506B5F2C89868695BFE179A8EDB3B28C0 | |||
3964 | Encrypt.exe | C:\ProgramData\Synaptics\RCXAE49.tmp | executable | |
MD5:B2B36F3E560521D53BD607DD291E3C08 | SHA256:B950370DE86A4496DA5959653B7370C9A8FFA6481698D463997951F534442CF9 | |||
4540 | svchost.exe | C:\$WinREAgent\RollbackInfo.ini.85h0 | binary | |
MD5:060E8A57F2B3274D5C19F54BF70CDE8D | SHA256:47E3FE9FC07CA94A43B6E462D8FC3C7F2A34229D99E1C5A176AB8B8BF66143EC | |||
4540 | svchost.exe | C:\$WinREAgent\RollbackInfo.ini | binary | |
MD5:D1457B72C3FB323A2671125AEF3EAB5D | SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1 | |||
4540 | svchost.exe | C:\$WinREAgent\read_it.txt | text | |
MD5:76E381F78E94C35D358A4FC048D3AA37 | SHA256:DB317B799B14715D1B26661DD60570FAA3B5C377656D490CD2697F78271C413F | |||
4540 | svchost.exe | C:\$WinREAgent\Backup\location.txt | binary | |
MD5:D1457B72C3FB323A2671125AEF3EAB5D | SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1 | |||
4540 | svchost.exe | C:\$WinREAgent\Backup\ReAgent.xml.qx01 | binary | |
MD5:807FEA67330634EA401A5C760BA874A5 | SHA256:D74A61712BF010ACE94B73323442B97A665194902CED05641F26CFBE43372F0B | |||
4540 | svchost.exe | C:\$WinREAgent\Backup\ReAgent.xml | binary | |
MD5:D1457B72C3FB323A2671125AEF3EAB5D | SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1 | |||
4540 | svchost.exe | C:\Recovery\ReAgentOld.xml.lbu4 | binary | |
MD5:A36026223D073960C2971C14982EC9E8 | SHA256:E1B7DEAAEC860C3281B19E7DCB43A4FCE4BB638FD69CA6EE6D23F7300B4251E7 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
6880 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 303 | 74.125.133.84:443 | https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | — | — | — |
2120 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 303 | 74.125.133.84:443 | https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | — | — | — |
— | — | GET | 303 | 74.125.133.84:443 | https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | — | — | — |
5516 | Synaptics.exe | GET | 200 | 69.42.215.252:80 | http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 | unknown | — | — | whitelisted |
— | — | GET | 404 | 216.58.212.161:443 | https://drive.usercontent.google.com/download?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | html | 1.61 Kb | — |
— | — | GET | 404 | 216.58.212.161:443 | https://drive.usercontent.google.com/download?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | html | 1.61 Kb | — |
— | — | GET | 404 | 216.58.212.161:443 | https://drive.usercontent.google.com/download?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download | unknown | html | 1.61 Kb | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7056 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6880 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5516 | Synaptics.exe | 69.42.215.252:80 | freedns.afraid.org | AWKNET | US | whitelisted |
7056 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2256 | svchost.exe | 224.0.0.251:5353 | — | — | — | unknown |
6880 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
xred.mooo.com |
| whitelisted |
freedns.afraid.org |
| whitelisted |
www.microsoft.com |
| whitelisted |
docs.google.com |
| shared |
drive.usercontent.google.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com |
— | — | A Network Trojan was detected | ET MALWARE Win32/SnakeKeyLogger Payload Request (GET) |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
— | — | A Network Trojan was detected | ET HUNTING Suspicious User-Agent Containing .exe |
Process | Message |
---|---|
wbadmin.exe | Invalid parameter passed to C runtime function.
|