Threat name:
Chaos, LCRYX, Xmrig
Alert
Classification:
rans.adwa.expl.evad.mine
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Changes security center settings (notifications, updates, antivirus, firewall)
Changes the wallpaper picture
Creates a Image File Execution Options (IFEO) Debugger entry
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates files inside the volume driver (system volume information)
Creates multiple autostart registry keys
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Detected Stratum mining protocol
Disable Task Manager(disabletaskmgr)
Disables the Windows registry editor (regedit)
Disables the Windows task manager (taskmgr)
Disables Windows Defender (via service or powershell)
Loading BitLocker PowerShell Module
May disable shadow drive data (uses vssadmin)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (has network functionality)
Potential malicious VBS script found (suspicious strings)
Queries Google from non browser process on port 80
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes a notice file (html or txt) to demand a ransom
Wscript starts Powershell (via cmd or directly)
Yara detected Chaos Ransomware
Yara detected Generic Ransomware
Yara detected LCRYX Ransomware
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1645671
Sample:
LCrypt0rX.vbs
Startdate:
22/03/2025
Architecture:
WINDOWS
Score:
100
96
twizt.net
2->96
98
cajgtus.com
2->98
100
56 other IPs or domains
2->100
124
Suricata IDS alerts
for network traffic
2->124
126
Antivirus detection
for URL or domain
2->126
128
Antivirus detection
for dropped file
2->128
130
17 other signatures
2->130
15
wscript.exe
1
2->15
started
18
wbengine.exe
3
2->18
started
20
svchost.exe
2->20
started
22
11 other processes
2->22
signatures3
process4
dnsIp5
144
Benign windows process
drops PE files
15->144
146
VBScript performs obfuscated
calls to suspicious
functions
15->146
148
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
15->148
154
10 other signatures
15->154
25
wscript.exe
26
41
15->25
started
150
Creates files inside
the volume driver (system
volume information)
18->150
152
Changes security center
settings (notifications,
updates, antivirus,
firewall)
20->152
102
127.0.0.1
unknown
unknown
22->102
30
Conhost.exe
22->30
started
signatures6
process7
dnsIp8
104
twizt.net
185.215.113.66, 50068, 50070, 50117
WHOLESALECONNECTIONSNL
Portugal
25->104
106
185.215.113.84, 50029, 80
WHOLESALECONNECTIONSNL
Portugal
25->106
108
8 other IPs or domains
25->108
88
C:\Windows\pei.exe, PE32
25->88
dropped
90
C:\Users\user\AppData\Local\...\pei[1].exe, PE32
25->90
dropped
92
C:\Windows\advapi32_ext.vbs, ASCII
25->92
dropped
94
5 other malicious files
25->94
dropped
134
System process connects
to network (likely due
to code injection or
exploit)
25->134
136
Wscript starts Powershell
(via cmd or directly)
25->136
138
Creates an undocumented
autostart registry key
25->138
142
19 other signatures
25->142
32
cmd.exe
1
25->32
started
35
cmd.exe
1
25->35
started
37
wscript.exe
25->37
started
39
7 other processes
25->39
file9
140
Detected Stratum mining
protocol
104->140
signatures10
process11
signatures12
110
May disable shadow drive
data (uses vssadmin)
32->110
112
Deletes shadow drive
data (may be related
to ransomware)
32->112
41
vssadmin.exe
1
32->41
started
44
conhost.exe
32->44
started
114
Deletes the backup plan
of Windows
35->114
46
conhost.exe
35->46
started
116
Wscript starts Powershell
(via cmd or directly)
37->116
118
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
37->118
48
taskkill.exe
37->48
started
56
9 other processes
37->56
120
Found Tor onion address
39->120
122
Loading BitLocker PowerShell
Module
39->122
50
wscript.exe
39->50
started
52
cmd.exe
39->52
started
54
cmd.exe
39->54
started
58
9 other processes
39->58
process13
signatures14
132
Deletes shadow drive
data (may be related
to ransomware)
41->132
60
conhost.exe
48->60
started
62
wscript.exe
50->62
started
64
conhost.exe
52->64
started
66
conhost.exe
54->66
started
68
conhost.exe
56->68
started
70
conhost.exe
56->70
started
72
conhost.exe
56->72
started
76
6 other processes
56->76
74
conhost.exe
58->74
started
process15
process16
78
wscript.exe
62->78
started
process17
80
wscript.exe
78->80
started
process18
82
wscript.exe
80->82
started
process19
84
wscript.exe
82->84
started
process20
86
wscript.exe
84->86
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.