File name:

Chaos Ransomware Builder v4.zip

Full analysis: https://app.any.run/tasks/3be431c3-e9b3-41c4-8c0f-c9c5a5e4a4fa
Verdict: Malicious activity
Analysis date: December 19, 2021, 16:17:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

41FDC2F2BF1BE4361E3C9EE6A650DAC0

SHA1:

8D65A729FE806F6564EEEE079CE96D30824BCC25

SHA256:

B40C52F62DB0108C1132FE90904A316FDC52F9A7A95BBEFD1146778B02DDAF7D

SSDEEP:

3072:5DqTMmLNHAFYHXfoS/3MekTGXbycnUfZlvMs29L5Q:WMeOYHXfBkGXbycUfZlvMs2M

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Chaos Ransomware Builder v4.exe (PID: 2400)
      • Chaos Ransomware Builder v4.exe (PID: 3232)
      • f.exe (PID: 2224)
      • svchost.exe (PID: 576)
    • Starts Visual C# compiler

      • Chaos Ransomware Builder v4.exe (PID: 3232)
    • Drops executable file immediately after starts

      • csc.exe (PID: 2168)
      • f.exe (PID: 2224)
    • Writes to a start menu file

      • svchost.exe (PID: 576)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2476)
      • Chaos Ransomware Builder v4.exe (PID: 3232)
      • csc.exe (PID: 2168)
      • cvtres.exe (PID: 520)
      • f.exe (PID: 2224)
      • svchost.exe (PID: 576)
    • Reads the computer name

      • WinRAR.exe (PID: 2476)
      • Chaos Ransomware Builder v4.exe (PID: 3232)
      • f.exe (PID: 2224)
      • svchost.exe (PID: 576)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2476)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2476)
      • csc.exe (PID: 2168)
      • f.exe (PID: 2224)
    • Drops a file with a compile date too recent

      • csc.exe (PID: 2168)
      • f.exe (PID: 2224)
    • Creates executable files which already exist in Windows

      • f.exe (PID: 2224)
    • Creates files in the user directory

      • f.exe (PID: 2224)
      • svchost.exe (PID: 576)
    • Starts itself from another location

      • f.exe (PID: 2224)
    • Executed via COM

      • DllHost.exe (PID: 3872)
  • INFO

    • Manual execution by user

      • f.exe (PID: 2224)
    • Checks supported languages

      • NOTEPAD.EXE (PID: 3016)
      • DllHost.exe (PID: 3872)
    • Reads the computer name

      • DllHost.exe (PID: 3872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Chaos Ransomware Builder v4.exe
ZipUncompressedSize: 563712
ZipCompressedSize: 130770
ZipCRC: 0xfc0fd79d
ZipModifyDate: 2021:08:04 11:08:15
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start winrar.exe chaos ransomware builder  v4.exe no specs chaos ransomware builder  v4.exe csc.exe cvtres.exe no specs f.exe svchost.exe notepad.exe no specs PhotoViewer.dll no specs

Process information

PID
CMD
Path
Indicators
Parent process
520C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESF737.tmp" "c:\Users\admin\Desktop\CSC8092BDAD66DF451087D1C8CFA1B87950.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft� Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
12.00.51209.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\cryptsp.dll
576"C:\Users\admin\AppData\Roaming\svchost.exe" C:\Users\admin\AppData\Roaming\svchost.exe
f.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2168"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\u25xk4pt.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
Chaos Ransomware Builder v4.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\ole32.dll
2224"C:\Users\admin\Desktop\f.exe" C:\Users\admin\Desktop\f.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
1
Version:
0.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\f.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2400"C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.33723\Chaos Ransomware Builder v4.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.33723\Chaos Ransomware Builder v4.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Chaos Ransomware v4
Exit code:
3221226540
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2476.33723\chaos ransomware builder v4.exe
c:\windows\system32\ntdll.dll
2476"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Chaos Ransomware Builder v4.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3016"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Roaming\read_it.txtC:\Windows\system32\NOTEPAD.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3232"C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.33723\Chaos Ransomware Builder v4.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2476.33723\Chaos Ransomware Builder v4.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Description:
Chaos Ransomware v4
Exit code:
0
Version:
3.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2476.33723\chaos ransomware builder v4.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3872C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
Total events
4 764
Read events
4 630
Write events
131
Delete events
3

Modification events

(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2476) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Chaos Ransomware Builder v4.zip
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2476) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
3
Suspicious files
0
Text files
99
Unknown types
2

Dropped files

PID
Process
Filename
Type
2168csc.exeC:\Users\admin\AppData\Local\Temp\u25xk4pt.outtext
MD5:
SHA256:
2224f.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:
SHA256:
520cvtres.exeC:\Users\admin\AppData\Local\Temp\RESF737.tmpo
MD5:
SHA256:
2168csc.exeC:\Users\admin\Desktop\f.exeexecutable
MD5:
SHA256:
3232Chaos Ransomware Builder v4.exeC:\Users\admin\AppData\Local\Temp\u25xk4pt.cmdlinetext
MD5:
SHA256:
3232Chaos Ransomware Builder v4.exeC:\Users\admin\AppData\Local\Temp\u25xk4pt.0.cstext
MD5:76E03563EE3AB915BCE443D213332EE7
SHA256:4C83FBA26F2AF551CA9044ACA13E24EE109228B0C06563EBE75E36A0D294C607
2476WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2476.33723\Chaos Ransomware Builder v4.exeexecutable
MD5:8B855E56E41A6E10D28522A20C1E0341
SHA256:F2665F89BA53ABD3DEB81988C0D5194992214053E77FC89B98B64A31A7504D77
2168csc.exeC:\Users\admin\Desktop\CSC8092BDAD66DF451087D1C8CFA1B87950.TMPres
MD5:2B75AC68C6BFC838520A6EC213F7B63A
SHA256:074ED926EF8A4815BC405E7C9C894AF10609F10FE8280E5DC331A7B020F9DDA2
576svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.urltext
MD5:83660DEB1A47E0B191FDA82BDFD61827
SHA256:87089BD6FEDDA43B5E4D738B5BF246BA1B2E5C248B9220F0D1E742B827F30B0D
576svchost.exeC:\Users\admin\Downloads\read_it.txttext
MD5:4217B8B83CE3C3F70029A056546F8FD0
SHA256:7D767E907BE373C680D1F7884D779588EB643BEBB3F27BF3B5ED4864AA4D8121
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info