Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
24-04-2020 08:40
Static task
static1
Behavioral task
behavioral1
Sample
maze.bin.exe
Resource
win7v200410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
maze.bin.exe
Resource
win10v200410
windows10_x64
0 signatures
0 seconds
General
-
Target
maze.bin.exe
-
Size
506KB
-
MD5
e69a8eb94f65480980deaf1ff5a431a6
-
SHA1
dcd2ab4540bde88f58dec8e8c243e303ec4bdd87
-
SHA256
fc611f9d09f645f31c4a77a27b6e6b1aec74db916d0712bef5bce052d12c971f
-
SHA512
3338e225d51efef723a520f52385f01b590638a4da7ccf56b52f59f2cfc169cba8b2f0328d90a1a38eaaeb3074c54d0dd1f82ae7f2bd1b5658a4899a0f93a9d2
Score
10/10
Malware Config
Extracted
Path
C:\DECRYPT-FILES.txt
Family
maze
Ransom Note
Attention!
----------------------------
| What happened?
----------------------------
All your files, documents, photos, databases, and other important data are safely encrypted with reliable algorithms.
You cannot access the files right now. But do not worry. You have a chance! It is easy to recover in a few steps.
----------------------------
| How to get my files back?
----------------------------
The only method to restore your files is to purchase a unique for you private key which is securely stored on our servers.
To contact us and purchase the key you have to visit our website in a hidden TOR network.
There are general 2 ways to reach us:
1) [Recommended] Using hidden TOR network.
a) Download a special TOR browser: https://www.torproject.org/
b) Install the TOR Browser.
c) Open the TOR Browser.
d) Open our website in the TOR browser: http://aoacugmutagkwctu.onion/86b6096872813b2a
e) Follow the instructions on this page.
2) If you have any problems connecting or using TOR network
a) Open our website: https://mazedecrypt.top/86b6096872813b2a
b) Follow the instructions on this page.
Warning: the second (2) method can be blocked in some countries. That is why the first (1) method is recommended to use.
On this page, you will see instructions on how to make a free decryption test and how to pay.
Also it has a live chat with our operators and support team.
----------------------------
| What about guarantees?
----------------------------
We understand your stress and worry.
So you have a FREE opportunity to test a service by instantly decrypting for free three files on your computer!
If you have any problems our friendly support team is always here to assist you in a live chat!
-------------------------------------------------------------------------------
THIS IS A SPECIAL BLOCK WITH A PERSONAL AND CONFIDENTIAL INFORMATION! DO NOT TOUCH IT WE NEED IT TO IDENTIFY AND AUTHORIZE YOU
---BEGIN MAZE KEY---
avVxn7yg5sLNWg8LGBmWs1uW9k1vmvjusTNH77L7I1M+/5Hca/cF9r8sC4llXFJt6D/WGYFAyq9z/NZx59/22k6Z1MS0vJeb0vEpb7dXdrL8I8TgeZ/yWIGY70t21eHybyK6obWXLzK7tAOw8spnDgY3a2NzRHXyLUSDq1iUWhQwrgzjZZEVd82zSaDHP1asJTNlsotKi3/TjMlA1Jv4PwQcJaIyUYlWhImMLQv3ZlcFJgBHYYA7vi8UxNEhCw2ypxvKsRRQbYbDeZ85SiuIEvWJALd/DtEAHa1Tm1C1qKNmVlJXclfqqSAySrVQnSB6my9Xm8hqWJQPp9xaPtfIK/c9arkWEIoeyufRCWPEbsj6FzfbBIf8Cx/9pBlV0DDDt1P7lD3ZGs6FacFYMdC6UereNpxwQrlTDBJxmFG94tdlfiAfAxkmK1SB0IPylamL3cX57gYOI1F+KoWBz0JMuhoMDWf3wAknNd0cDaX8fYJ1IftUf7txp1AKFmXs4DvZj2ItgjJbXJKiAe4WjyoBZaOf0p2y7IwEtXWjiDKOnkG/hT8Vt0jFZhlhtxEwluYvgdSnGUDccJRKqRSAPJ1kxIxWOqKv+/etpFVnDhv3pPACGb00VDlojVg2n7yQTDd6lLEsmD/nYFK29dMm63GSRlU9BpH3tnhqwQ4up903YGsSEYtVrZvuadWckXOq4TNwCYu7v2RAX575Pu74qbOcXvOqutw02JawxQk1jSDsP6UypF2/5ZbXnkaR0ZI6Jq10uIXDhPbp0jjvdVExwgHXijn8D0mqsfPDcYVJJIg3MOd8Iq1WNsvppxba2GKB78uwbuXVfLxo7PW0kGT/Itbe88880KPNFuuejhY7KwbopllRFkmIn2Ib/aY/YMU+uDb6K8yKPsd7XHgzO7Jz/oSiBeq1hWRnVuJjN+BjWhcWsCnm6BCQSEsEmvIOtyAIgx2BjmAI31Gq8Hz7SbCwQaiPSCbegtAUFdN7r/lWfi8Vrl4jXx5AwKD9k87hCyfIWirW7Rli+SAUAtHxy80ocDbZthlEgYGOZzNlnfHPJrzDI+GYvJjr2dWd44C1S/i4eLh9mpp1PvUR4Kr3WFxLv/qPWpCFIDJhvhGzs+esmD/jC/G9jedMXYSIaYDTdWamPwXaKe9tXOzkqHKWda+aybOnIlCOO1Nt/GEmgtypZfsIhgpU9peggv16DKOGn/wBX4Oi89XrbkxcSJ91zy2i36lU1tDp5V+cxy5nNKTEZbePOD8mxOobGJ1/2hAGTZf6bAq1vhlEe1xFOSj+BD/TFtCJiCcEgeINVmROxl3G/KOlPaHTE2D070FGK9JViLTBBfaSGgLmvD7zPs8UvnDJESJXeQkXFNfk/tTKQ/HS9n3PRaaPNQxml9VIPzxiC74FP4/b5I9DxX2W6jEVNVV7gBEKmUfbT5bX+OYYcCdlgAK4eVLUrOFA6SCUQzt8zKTs3xh/MMW1W6e9UBLmb9t4pr2a/Tu9sVfKFw+ZFBl+QYcqagZ6c746n9rsja+zYa2nbxIkroL4n/sf4nN6+5gjN47k2WblRZOir14NJa/JSAPUYXjkRwG6J2E2+CbCB3uqkj+Q+LSE9OVQ+oxvZFvZkCZQKkVTvouDY5w8ItQyRLPvKk8cdw5xasntXoJyuyQ7IK5SZ8A7eCuImJ+SoUe6IsRkY+Nzu8Qp/BFIsKkCb3OEbafJxdMtMdjM4EGleTvsRbLGpPIcCPc7gf/HbI/uZbyfLj2yeUispMTXe3ojPAtbgIt7KxxDQg5YrFuNhct1exXp2RweW6jWV5f3IyZpTVuBOXEsR/e+GThCJeQTNp09IReYdy5CTZvpFamkG4d4qWPMu4r2MU8yTPyGno9iD7Dw6Y0v1yvz5BIwlMeiQLpYoMX9Gy+WtcOx6DxjX9VAkue9PDT9ztfmE8KlOKuvywFqJ7uinxxZxVOVXo2Om5kyGlh/JoVoz+WSzuITGcTHFYp2kFDA8N/Q59p2/q3uMtCpx4sbcL4OOsuLAyS3KTOdaAhy/LmI+pE77xeJJNzxivvdQH2714VNBcdlSd1DX+fiYcWu2GTsHCJz2LICMcCoXm43REeTZCf2kW5OkLUFNx5CIfn4Wa0AgzN2fnm7udS1sM9nqpx/SveSb8BRcvou6Emi+OH1+dpQUD2v+7ec4x/Yjmv/p1HV8y7RZdBkcB6mgNLbqMz53Lp3vwPlCeIE4dcuk5+zfwqdDPUZuXBr0stoBihGggoiOAA2AGIANgAwADkANgA4ADcAMgA4ADEAMwBiADIAYQAAABCAYBoMQQBkAG0AaQBuAAAAIhJOAEgARwBFAEIATQBOAEUAAAAqDG4AbwBuAGUAfAAAADIeVwBpAG4AZABvAHcAcwAgADEAMAAgAFAAcgBvAAAAQjh8AEMAXwBGAF8AMgA0ADUAMQAzADUALwAyADYAMgAwADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhw6YsCeAuAAQGKAQUyLjAuOQ==
---END MAZE KEY---
URLs
http://aoacugmutagkwctu.onion/86b6096872813b2a
https://mazedecrypt.top/86b6096872813b2a
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2528 4020 maze.bin.exe 72 PID 4020 wrote to memory of 2528 4020 maze.bin.exe 72 -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2136578390-2771164089-400866267-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" maze.bin.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Maze
Ransomware family also known as ChaCha.
-
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\SubmitConvertTo.rar maze.bin.exe File opened for modification C:\Program Files\0wplx.tmp maze.bin.exe File opened for modification C:\Program Files\LimitClear.avi maze.bin.exe File opened for modification C:\Program Files\MoveExpand.wmf maze.bin.exe File opened for modification C:\Program Files\PingGet.DVR maze.bin.exe File opened for modification C:\Program Files\UninstallCopy.rm maze.bin.exe File opened for modification C:\Program Files\DisableUnlock.emf maze.bin.exe File opened for modification C:\Program Files\HideExport.AAC maze.bin.exe File opened for modification C:\Program Files\PublishClose.dotx maze.bin.exe File opened for modification C:\Program Files\SwitchDeny.ttf maze.bin.exe File opened for modification C:\Program Files\SetProtect.DVR maze.bin.exe File opened for modification C:\Program Files\SkipReset.vsd maze.bin.exe File opened for modification C:\Program Files\ApproveResize.mpeg maze.bin.exe File opened for modification C:\Program Files\DebugJoin.snd maze.bin.exe File opened for modification C:\Program Files\MeasureExpand.cmd maze.bin.exe File opened for modification C:\Program Files\RedoUninstall.mpeg3 maze.bin.exe File opened for modification C:\Program Files\RequestMeasure.odt maze.bin.exe File opened for modification C:\Program Files\RestoreRegister.mht maze.bin.exe File opened for modification C:\Program Files\UnblockDisconnect.m4v maze.bin.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Program Files\ImportWatch.htm maze.bin.exe File opened for modification C:\Program Files\NewExport.m1v maze.bin.exe File opened for modification C:\Program Files\ReadMount.3g2 maze.bin.exe File opened for modification C:\Program Files\ReceiveConfirm.wmf maze.bin.exe File opened for modification C:\Program Files (x86)\0wplx.tmp maze.bin.exe File opened for modification C:\Program Files\RemoveLimit.wmv maze.bin.exe File opened for modification C:\Program Files\SaveUnblock.mp2v maze.bin.exe File opened for modification C:\Program Files\SubmitHide.xhtml maze.bin.exe File opened for modification C:\Program Files\UninstallCheckpoint.dib maze.bin.exe File opened for modification C:\Program Files\ClearCompare.vsd maze.bin.exe File opened for modification C:\Program Files\RenameUnblock.ram maze.bin.exe File opened for modification C:\Program Files\ResumeMove.aifc maze.bin.exe File opened for modification C:\Program Files\SplitSubmit.wdp maze.bin.exe File opened for modification C:\Program Files\DismountClose.odp maze.bin.exe File opened for modification C:\Program Files\ExportDisconnect.mhtml maze.bin.exe File opened for modification C:\Program Files\RedoHide.xml maze.bin.exe File opened for modification C:\Program Files\UnprotectImport.kix maze.bin.exe File opened for modification C:\Program Files\SyncShow.ods maze.bin.exe File opened for modification C:\Program Files\UnprotectUpdate.png maze.bin.exe File created C:\Program Files\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Program Files\GetBlock.emz maze.bin.exe File opened for modification C:\Program Files\ResolveWait.mp4 maze.bin.exe File opened for modification C:\Program Files\SubmitWatch.gif maze.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4020 maze.bin.exe 4020 maze.bin.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 3136 vssvc.exe Token: SeRestorePrivilege 3136 vssvc.exe Token: SeAuditPrivilege 3136 vssvc.exe Token: SeIncreaseQuotaPrivilege 2528 wmic.exe Token: SeSecurityPrivilege 2528 wmic.exe Token: SeTakeOwnershipPrivilege 2528 wmic.exe Token: SeLoadDriverPrivilege 2528 wmic.exe Token: SeSystemProfilePrivilege 2528 wmic.exe Token: SeSystemtimePrivilege 2528 wmic.exe Token: SeProfSingleProcessPrivilege 2528 wmic.exe Token: SeIncBasePriorityPrivilege 2528 wmic.exe Token: SeCreatePagefilePrivilege 2528 wmic.exe Token: SeBackupPrivilege 2528 wmic.exe Token: SeRestorePrivilege 2528 wmic.exe Token: SeShutdownPrivilege 2528 wmic.exe Token: SeDebugPrivilege 2528 wmic.exe Token: SeSystemEnvironmentPrivilege 2528 wmic.exe Token: SeRemoteShutdownPrivilege 2528 wmic.exe Token: SeUndockPrivilege 2528 wmic.exe Token: SeManageVolumePrivilege 2528 wmic.exe Token: 33 2528 wmic.exe Token: 34 2528 wmic.exe Token: 35 2528 wmic.exe Token: 36 2528 wmic.exe Token: SeIncreaseQuotaPrivilege 2528 wmic.exe Token: SeSecurityPrivilege 2528 wmic.exe Token: SeTakeOwnershipPrivilege 2528 wmic.exe Token: SeLoadDriverPrivilege 2528 wmic.exe Token: SeSystemProfilePrivilege 2528 wmic.exe Token: SeSystemtimePrivilege 2528 wmic.exe Token: SeProfSingleProcessPrivilege 2528 wmic.exe Token: SeIncBasePriorityPrivilege 2528 wmic.exe Token: SeCreatePagefilePrivilege 2528 wmic.exe Token: SeBackupPrivilege 2528 wmic.exe Token: SeRestorePrivilege 2528 wmic.exe Token: SeShutdownPrivilege 2528 wmic.exe Token: SeDebugPrivilege 2528 wmic.exe Token: SeSystemEnvironmentPrivilege 2528 wmic.exe Token: SeRemoteShutdownPrivilege 2528 wmic.exe Token: SeUndockPrivilege 2528 wmic.exe Token: SeManageVolumePrivilege 2528 wmic.exe Token: 33 2528 wmic.exe Token: 34 2528 wmic.exe Token: 35 2528 wmic.exe Token: 36 2528 wmic.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\0wplx.tmp maze.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt maze.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0wplx.tmp maze.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt maze.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Drops startup file
PID:4020 -
C:\Windows\system32\wbem\wmic.exe"C:\eprvn\srnv\..\..\Windows\hram\askf\aitp\..\..\..\system32\jn\orhxy\..\..\wbem\svb\i\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:3136