Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7v200410 -
submitted
24-04-2020 08:40
Static task
static1
Behavioral task
behavioral1
Sample
maze.bin.exe
Resource
win7v200410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
maze.bin.exe
Resource
win10v200410
windows10_x64
0 signatures
0 seconds
General
-
Target
maze.bin.exe
-
Size
506KB
-
MD5
e69a8eb94f65480980deaf1ff5a431a6
-
SHA1
dcd2ab4540bde88f58dec8e8c243e303ec4bdd87
-
SHA256
fc611f9d09f645f31c4a77a27b6e6b1aec74db916d0712bef5bce052d12c971f
-
SHA512
3338e225d51efef723a520f52385f01b590638a4da7ccf56b52f59f2cfc169cba8b2f0328d90a1a38eaaeb3074c54d0dd1f82ae7f2bd1b5658a4899a0f93a9d2
Score
10/10
Malware Config
Extracted
Path
C:\DECRYPT-FILES.txt
Family
maze
Ransom Note
Attention!
----------------------------
| What happened?
----------------------------
All your files, documents, photos, databases, and other important data are safely encrypted with reliable algorithms.
You cannot access the files right now. But do not worry. You have a chance! It is easy to recover in a few steps.
----------------------------
| How to get my files back?
----------------------------
The only method to restore your files is to purchase a unique for you private key which is securely stored on our servers.
To contact us and purchase the key you have to visit our website in a hidden TOR network.
There are general 2 ways to reach us:
1) [Recommended] Using hidden TOR network.
a) Download a special TOR browser: https://www.torproject.org/
b) Install the TOR Browser.
c) Open the TOR Browser.
d) Open our website in the TOR browser: http://aoacugmutagkwctu.onion/869e09631e4b541c
e) Follow the instructions on this page.
2) If you have any problems connecting or using TOR network
a) Open our website: https://mazedecrypt.top/869e09631e4b541c
b) Follow the instructions on this page.
Warning: the second (2) method can be blocked in some countries. That is why the first (1) method is recommended to use.
On this page, you will see instructions on how to make a free decryption test and how to pay.
Also it has a live chat with our operators and support team.
----------------------------
| What about guarantees?
----------------------------
We understand your stress and worry.
So you have a FREE opportunity to test a service by instantly decrypting for free three files on your computer!
If you have any problems our friendly support team is always here to assist you in a live chat!
-------------------------------------------------------------------------------
THIS IS A SPECIAL BLOCK WITH A PERSONAL AND CONFIDENTIAL INFORMATION! DO NOT TOUCH IT WE NEED IT TO IDENTIFY AND AUTHORIZE YOU
---BEGIN MAZE KEY---
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
---END MAZE KEY---
URLs
http://aoacugmutagkwctu.onion/869e09631e4b541c
https://mazedecrypt.top/869e09631e4b541c
Signatures
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8k35i5y.tmp maze.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\8k35i5y.tmp maze.bin.exe -
Maze
Ransomware family also known as ChaCha.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2016 maze.bin.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1360 vssvc.exe Token: SeRestorePrivilege 1360 vssvc.exe Token: SeAuditPrivilege 1360 vssvc.exe Token: SeIncreaseQuotaPrivilege 1760 wmic.exe Token: SeSecurityPrivilege 1760 wmic.exe Token: SeTakeOwnershipPrivilege 1760 wmic.exe Token: SeLoadDriverPrivilege 1760 wmic.exe Token: SeSystemProfilePrivilege 1760 wmic.exe Token: SeSystemtimePrivilege 1760 wmic.exe Token: SeProfSingleProcessPrivilege 1760 wmic.exe Token: SeIncBasePriorityPrivilege 1760 wmic.exe Token: SeCreatePagefilePrivilege 1760 wmic.exe Token: SeBackupPrivilege 1760 wmic.exe Token: SeRestorePrivilege 1760 wmic.exe Token: SeShutdownPrivilege 1760 wmic.exe Token: SeDebugPrivilege 1760 wmic.exe Token: SeSystemEnvironmentPrivilege 1760 wmic.exe Token: SeRemoteShutdownPrivilege 1760 wmic.exe Token: SeUndockPrivilege 1760 wmic.exe Token: SeManageVolumePrivilege 1760 wmic.exe Token: 33 1760 wmic.exe Token: 34 1760 wmic.exe Token: 35 1760 wmic.exe Token: SeIncreaseQuotaPrivilege 1760 wmic.exe Token: SeSecurityPrivilege 1760 wmic.exe Token: SeTakeOwnershipPrivilege 1760 wmic.exe Token: SeLoadDriverPrivilege 1760 wmic.exe Token: SeSystemProfilePrivilege 1760 wmic.exe Token: SeSystemtimePrivilege 1760 wmic.exe Token: SeProfSingleProcessPrivilege 1760 wmic.exe Token: SeIncBasePriorityPrivilege 1760 wmic.exe Token: SeCreatePagefilePrivilege 1760 wmic.exe Token: SeBackupPrivilege 1760 wmic.exe Token: SeRestorePrivilege 1760 wmic.exe Token: SeShutdownPrivilege 1760 wmic.exe Token: SeDebugPrivilege 1760 wmic.exe Token: SeSystemEnvironmentPrivilege 1760 wmic.exe Token: SeRemoteShutdownPrivilege 1760 wmic.exe Token: SeUndockPrivilege 1760 wmic.exe Token: SeManageVolumePrivilege 1760 wmic.exe Token: 33 1760 wmic.exe Token: 34 1760 wmic.exe Token: 35 1760 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1760 2016 maze.bin.exe 29 PID 2016 wrote to memory of 1760 2016 maze.bin.exe 29 PID 2016 wrote to memory of 1760 2016 maze.bin.exe 29 PID 2016 wrote to memory of 1760 2016 maze.bin.exe 29 -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File opened for modification C:\Program Files\SwitchUnprotect.wm maze.bin.exe File opened for modification C:\Program Files (x86)\8k35i5y.tmp maze.bin.exe File opened for modification C:\Program Files\8k35i5y.tmp maze.bin.exe File opened for modification C:\Program Files\LimitGrant.snd maze.bin.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt maze.bin.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Program Files\OpenLimit.lock maze.bin.exe File opened for modification C:\Program Files\RegisterUnregister.mpg maze.bin.exe File opened for modification C:\Program Files\ResumeInitialize.ps1 maze.bin.exe File opened for modification C:\Program Files\SuspendGet.odt maze.bin.exe File opened for modification C:\Program Files\DisableUndo.au3 maze.bin.exe File opened for modification C:\Program Files\EnableSync.edrwx maze.bin.exe File opened for modification C:\Program Files\JoinClear.pptm maze.bin.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\8k35i5y.tmp maze.bin.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\Desktop\8k35i5y.tmp maze.bin.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt maze.bin.exe File created C:\Program Files\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Program Files\ConvertToRestore.ttc maze.bin.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\8k35i5y.tmp maze.bin.exe File opened for modification C:\Program Files\UpdateUnpublish.xht maze.bin.exe File opened for modification C:\Program Files\CompleteUninstall.dotx maze.bin.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Program Files\SaveRepair.emz maze.bin.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3765897441-2376744223-3151462503-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" maze.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in Program Files directory
- Sets desktop wallpaper using registry
PID:2016 -
C:\Windows\system32\wbem\wmic.exe"C:\gf\..\Windows\te\tefg\..\..\system32\iq\unju\fuxr\..\..\..\wbem\gdccf\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:1360
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1792