Analysis
-
max time kernel
112s -
max time network
124s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
19-04-2020 05:49
Static task
static1
Behavioral task
behavioral1
Sample
91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe
Resource
win10v200410
General
-
Target
91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe
-
Size
484KB
-
MD5
8205a1106ae91d0b0705992d61e84ab2
-
SHA1
49cdc85728bf604a50f838f7ae941977852cc7a2
-
SHA256
91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1
-
SHA512
8fc53dacd6b21ed9e1dc2a00edf154c40699754a116bdaf6566b8341c70ac293c8ba69d69a767af5ad8d0c8737a22dbe2609594983a1200375d40af3f4953b2e
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/86b6096840a51f29
https://mazedecrypt.top/86b6096840a51f29
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe 2572 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 4044 vssvc.exe Token: SeRestorePrivilege 4044 vssvc.exe Token: SeAuditPrivilege 4044 vssvc.exe Token: SeIncreaseQuotaPrivilege 3308 wmic.exe Token: SeSecurityPrivilege 3308 wmic.exe Token: SeTakeOwnershipPrivilege 3308 wmic.exe Token: SeLoadDriverPrivilege 3308 wmic.exe Token: SeSystemProfilePrivilege 3308 wmic.exe Token: SeSystemtimePrivilege 3308 wmic.exe Token: SeProfSingleProcessPrivilege 3308 wmic.exe Token: SeIncBasePriorityPrivilege 3308 wmic.exe Token: SeCreatePagefilePrivilege 3308 wmic.exe Token: SeBackupPrivilege 3308 wmic.exe Token: SeRestorePrivilege 3308 wmic.exe Token: SeShutdownPrivilege 3308 wmic.exe Token: SeDebugPrivilege 3308 wmic.exe Token: SeSystemEnvironmentPrivilege 3308 wmic.exe Token: SeRemoteShutdownPrivilege 3308 wmic.exe Token: SeUndockPrivilege 3308 wmic.exe Token: SeManageVolumePrivilege 3308 wmic.exe Token: 33 3308 wmic.exe Token: 34 3308 wmic.exe Token: 35 3308 wmic.exe Token: 36 3308 wmic.exe Token: SeIncreaseQuotaPrivilege 3308 wmic.exe Token: SeSecurityPrivilege 3308 wmic.exe Token: SeTakeOwnershipPrivilege 3308 wmic.exe Token: SeLoadDriverPrivilege 3308 wmic.exe Token: SeSystemProfilePrivilege 3308 wmic.exe Token: SeSystemtimePrivilege 3308 wmic.exe Token: SeProfSingleProcessPrivilege 3308 wmic.exe Token: SeIncBasePriorityPrivilege 3308 wmic.exe Token: SeCreatePagefilePrivilege 3308 wmic.exe Token: SeBackupPrivilege 3308 wmic.exe Token: SeRestorePrivilege 3308 wmic.exe Token: SeShutdownPrivilege 3308 wmic.exe Token: SeDebugPrivilege 3308 wmic.exe Token: SeSystemEnvironmentPrivilege 3308 wmic.exe Token: SeRemoteShutdownPrivilege 3308 wmic.exe Token: SeUndockPrivilege 3308 wmic.exe Token: SeManageVolumePrivilege 3308 wmic.exe Token: 33 3308 wmic.exe Token: 34 3308 wmic.exe Token: 35 3308 wmic.exe Token: 36 3308 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3308 2572 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe 72 PID 2572 wrote to memory of 3308 2572 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe 72 -
Maze
Ransomware family also known as ChaCha.
-
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\SubmitConvertTo.rar 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\GetBlock.emz 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\PingGet.DVR 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ReceiveConfirm.wmf 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RedoUninstall.mpeg3 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RemoveLimit.wmv 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RestoreRegister.mht 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SubmitWatch.gif 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\UnblockDisconnect.m4v 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\DebugJoin.snd 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\DisableUnlock.emf 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\UninstallCheckpoint.dib 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\UnprotectImport.kix 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RedoHide.xml 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RenameUnblock.ram 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SubmitHide.xhtml 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SwitchDeny.ttf 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\lsbfhhg.tmp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ReadMount.3g2 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SkipReset.vsd 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SyncShow.ods 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\UninstallCopy.rm 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ApproveResize.mpeg 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SetProtect.DVR 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\NewExport.m1v 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SaveUnblock.mp2v 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File created C:\Program Files\DECRYPT-FILES.txt 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\HideExport.AAC 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\UnprotectUpdate.png 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ClearCompare.vsd 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ResolveWait.mp4 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\LimitClear.avi 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\RequestMeasure.odt 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\SplitSubmit.wdp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files (x86)\lsbfhhg.tmp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\DismountClose.odp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ExportDisconnect.mhtml 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\MoveExpand.wmf 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\PublishClose.dotx 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ResumeMove.aifc 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\ImportWatch.htm 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Program Files\MeasureExpand.cmd 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsbfhhg.tmp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\lsbfhhg.tmp 91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe -
Makes http(s) request 30 IoCs
Contacts server via http/https, possibly for C2 communication.
description flow ioc HTTP URL 21 http://91.218.114.38/edit/register/fsiepmtew.aspx?uv=7r&ue=3lmfoyi&li=8&p=240307 HTTP URL 3 http://91.218.114.11/vfdevcfspx.html?h=k7&xcru=x76454s&j=rkln0wa4&oh=6vg5l8 HTTP URL 19 http://91.218.114.37/support/signin/bqr.asp?ymy=i&j=q7h6&iq=s HTTP URL 20 http://91.218.114.38/edit/register/fsiepmtew.aspx?uv=7r&ue=3lmfoyi&li=8&p=240307 HTTP URL 2 http://91.218.114.4/gnv.asp?fcu=1506&cw=7t HTTP URL 17 http://91.218.114.32/transfer/post/qtkngiuvt.html?dov=f05&hlt=66f8&r=bbivlf41cu HTTP URL 16 http://91.218.114.32/opdgirs.cgi?aqn=a687piwjv HTTP URL 17 http://91.218.114.32/opdgirs.cgi?aqn=a687piwjv HTTP URL 28 http://91.218.114.38/vmjur.do?l=26nfxvjh&gkl=s51p384&mmy=2toas6&fcwl=73xp2 HTTP URL 1 http://91.218.114.4/support/checkout/xy.cgi?w=m5f0&fu=my23j&nt=spy6&gc=yx2m47k4g HTTP URL 26 http://91.218.114.37/archive/update/xlgldtsqwr.jspx?m=52kyc752s8&w=s7r&fit=s88 HTTP URL 28 http://91.218.114.38/auth/login HTTP URL 25 http://91.218.114.32/transfer/post/qtkngiuvt.html?dov=f05&hlt=66f8&r=bbivlf41cu HTTP URL 27 http://91.218.114.38/vmjur.do?l=26nfxvjh&gkl=s51p384&mmy=2toas6&fcwl=73xp2 HTTP URL 23 http://91.218.114.79/pesyunomy.shtml?wxpg=788c128&e=wbf&fg=s HTTP URL 10 http://91.218.114.26/webauth/analytics/n.php?bso=58vql156x&a=q7w3 HTTP URL 19 http://91.218.114.37/auth/login HTTP URL 31 http://91.218.114.79/wcx.php?wjs=lw13f&uj=52a31mp HTTP URL 22 http://91.218.114.77/payout/archive/eqhrggveoq.aspx?vjoi=dw&g=vi631688q&s=8ry&yer=0 HTTP URL 30 http://91.218.114.79/wcx.php?wjs=lw13f&uj=52a31mp HTTP URL 5 http://91.218.114.26/post/ixlptkkq.action?a=pla&edjp=q5h8rxh HTTP URL 2 http://91.218.114.4/support/checkout/xy.cgi?w=m5f0&fu=my23j&nt=spy6&gc=yx2m47k4g HTTP URL 18 http://91.218.114.37/support/signin/bqr.asp?ymy=i&j=q7h6&iq=s HTTP URL 9 http://91.218.114.25/forum/qehhr.cgi HTTP URL 21 http://91.218.114.38/auth/login HTTP URL 29 http://91.218.114.77/dcjljbjlp.do?rk=63p&eiyx=7h7u45o&rhki=do7ju HTTP URL 24 http://91.218.114.79/pesyunomy.shtml?wxpg=788c128&e=wbf&fg=s HTTP URL 4 http://91.218.114.25/wire/news/mjlkdmuuub.php?oqd=lm37777 HTTP URL 7 http://91.218.114.4/gnv.asp?fcu=1506&cw=7t HTTP URL 8 http://91.218.114.11/h.do -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe"C:\Users\Admin\AppData\Local\Temp\91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in Program Files directory
- Drops startup file
PID:2572 -
C:\Windows\system32\wbem\wmic.exe"C:\gwr\..\Windows\l\gtie\..\..\system32\wew\..\wbem\pjr\c\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:4044