Analysis

  • max time kernel
    108s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7v200410
  • submitted
    20-04-2020 15:41

General

  • Target

    launch.bat

  • Size

    68B

  • MD5

    fc9df43a0e518e46173810698bb61f2b

  • SHA1

    d349c3a95356d0f97707b79495753bd03653f629

  • SHA256

    d74870a0ba0e9cc7388bef1b4de9c09f6316a9ccf8e3191cdf6809e8032873ad

  • SHA512

    84fec80449e9b5b1ddb150f6bda64b79435a38111273ab57e92a4ceeaa44c4c320eb9e02cc5384dbf281e52c936b14602826c54c8999e9df23cfe7e5800293d0

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Modifies service 2 TTPs 5 IoCs
  • Maze

    Ransomware family also known as ChaCha.

  • Drops file in Program Files directory 23 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Drops startup file 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\launch.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\system32\regsvr32.exe
      regsvr32 "C:\Users\Admin\AppData\Local\temp\kepstl32.dll"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Users\Admin\AppData\Local\temp\kepstl32.dll"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Drops file in Program Files directory
        • Sets desktop wallpaper using registry
        • Suspicious use of WriteProcessMemory
        • Drops startup file
        PID:1664
        • C:\Windows\system32\wbem\wmic.exe
          "C:\p\m\cwmsx\..\..\..\Windows\hyc\hfece\..\..\system32\qlc\s\mk\..\..\..\wbem\iya\masq\e\..\..\..\wmic.exe" shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2012
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Modifies service
    • Suspicious use of AdjustPrivilegeToken
    PID:1696
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:1172

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-0-0x00000000007E0000-0x000000000083D000-memory.dmp

      Filesize

      372KB

    • memory/1664-4-0x00000000007E0000-0x000000000083D000-memory.dmp

      Filesize

      372KB