Analysis
-
max time kernel
93s -
max time network
72s -
platform
windows7_x64 -
resource
win7 -
submitted
06-08-2020 08:04
Static task
static1
Behavioral task
behavioral1
Sample
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
Resource
win7
Behavioral task
behavioral2
Sample
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
Resource
win10v200722
General
-
Target
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
-
Size
368KB
-
MD5
38d00c31a81c5b9e1f468145cda774a3
-
SHA1
d9f6db88ff739713960f7b8d2706ad3f4704b287
-
SHA256
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028
-
SHA512
5ca3ed455b052e4a3a2b4f784910bc725d507683b98d2ac2aab0b6b258bc49f8cbada57bd6cfcec9f332b9ed2aaf8da59d79be817875826999a700c5c79e1027
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b170c9ae2a122c2
https://mazedecrypt.top/6b170c9ae2a122c2
Signatures
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnblockFind.png => C:\Users\Admin\Pictures\UnblockFind.png.B0Nq rundll32.exe File renamed C:\Users\Admin\Pictures\UndoUnprotect.tiff => C:\Users\Admin\Pictures\UndoUnprotect.tiff.B0Nq rundll32.exe File renamed C:\Users\Admin\Pictures\ImportComplete.png => C:\Users\Admin\Pictures\ImportComplete.png.OKxiBz rundll32.exe File renamed C:\Users\Admin\Pictures\PublishRestore.crw => C:\Users\Admin\Pictures\PublishRestore.crw.nOQYVNU rundll32.exe File renamed C:\Users\Admin\Pictures\SelectRestore.tif => C:\Users\Admin\Pictures\SelectRestore.tif.AwiX rundll32.exe File opened for modification C:\Users\Admin\Pictures\StepRead.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\StepRead.tiff => C:\Users\Admin\Pictures\StepRead.tiff.B0Nq rundll32.exe File opened for modification C:\Users\Admin\Pictures\UndoUnprotect.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\ExportDisconnect.tif => C:\Users\Admin\Pictures\ExportDisconnect.tif.OKxiBz rundll32.exe File renamed C:\Users\Admin\Pictures\RepairEdit.tif => C:\Users\Admin\Pictures\RepairEdit.tif.AwiX rundll32.exe File renamed C:\Users\Admin\Pictures\RequestResize.png => C:\Users\Admin\Pictures\RequestResize.png.AwiX rundll32.exe File renamed C:\Users\Admin\Pictures\SkipClose.tif => C:\Users\Admin\Pictures\SkipClose.tif.B0Nq rundll32.exe File renamed C:\Users\Admin\Pictures\StopExport.crw => C:\Users\Admin\Pictures\StopExport.crw.B0Nq rundll32.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b170c9ae2a122c2.tmp rundll32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b170c9ae2a122c2.tmp rundll32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1036 vssvc.exe Token: SeRestorePrivilege 1036 vssvc.exe Token: SeAuditPrivilege 1036 vssvc.exe Token: SeIncreaseQuotaPrivilege 1904 wmic.exe Token: SeSecurityPrivilege 1904 wmic.exe Token: SeTakeOwnershipPrivilege 1904 wmic.exe Token: SeLoadDriverPrivilege 1904 wmic.exe Token: SeSystemProfilePrivilege 1904 wmic.exe Token: SeSystemtimePrivilege 1904 wmic.exe Token: SeProfSingleProcessPrivilege 1904 wmic.exe Token: SeIncBasePriorityPrivilege 1904 wmic.exe Token: SeCreatePagefilePrivilege 1904 wmic.exe Token: SeBackupPrivilege 1904 wmic.exe Token: SeRestorePrivilege 1904 wmic.exe Token: SeShutdownPrivilege 1904 wmic.exe Token: SeDebugPrivilege 1904 wmic.exe Token: SeSystemEnvironmentPrivilege 1904 wmic.exe Token: SeRemoteShutdownPrivilege 1904 wmic.exe Token: SeUndockPrivilege 1904 wmic.exe Token: SeManageVolumePrivilege 1904 wmic.exe Token: 33 1904 wmic.exe Token: 34 1904 wmic.exe Token: 35 1904 wmic.exe Token: SeIncreaseQuotaPrivilege 1904 wmic.exe Token: SeSecurityPrivilege 1904 wmic.exe Token: SeTakeOwnershipPrivilege 1904 wmic.exe Token: SeLoadDriverPrivilege 1904 wmic.exe Token: SeSystemProfilePrivilege 1904 wmic.exe Token: SeSystemtimePrivilege 1904 wmic.exe Token: SeProfSingleProcessPrivilege 1904 wmic.exe Token: SeIncBasePriorityPrivilege 1904 wmic.exe Token: SeCreatePagefilePrivilege 1904 wmic.exe Token: SeBackupPrivilege 1904 wmic.exe Token: SeRestorePrivilege 1904 wmic.exe Token: SeShutdownPrivilege 1904 wmic.exe Token: SeDebugPrivilege 1904 wmic.exe Token: SeSystemEnvironmentPrivilege 1904 wmic.exe Token: SeRemoteShutdownPrivilege 1904 wmic.exe Token: SeUndockPrivilege 1904 wmic.exe Token: SeManageVolumePrivilege 1904 wmic.exe Token: 33 1904 wmic.exe Token: 34 1904 wmic.exe Token: 35 1904 wmic.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" rundll32.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Maze
Ransomware family also known as ChaCha.
-
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files\MoveRedo.wmx rundll32.exe File opened for modification C:\Program Files\TestMerge.eprtx rundll32.exe File opened for modification C:\Program Files\CompareFind.wmx rundll32.exe File opened for modification C:\Program Files\AssertUnlock.ADTS rundll32.exe File opened for modification C:\Program Files\SaveStart.clr rundll32.exe File opened for modification C:\Program Files\WaitShow.ram rundll32.exe File opened for modification C:\Program Files\EnterResize.bmp rundll32.exe File opened for modification C:\Program Files\SelectClear.dxf rundll32.exe File opened for modification C:\Program Files\ShowRemove.gif rundll32.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\6b170c9ae2a122c2.tmp rundll32.exe File opened for modification C:\Program Files\ResetShow.dotm rundll32.exe File opened for modification C:\Program Files\StartPublish.potm rundll32.exe File opened for modification C:\Program Files\UnpublishGroup.sql rundll32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\DisconnectPing.txt rundll32.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt rundll32.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\UnprotectOut.vstm rundll32.exe File opened for modification C:\Program Files\6b170c9ae2a122c2.tmp rundll32.exe File created C:\Program Files\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\6b170c9ae2a122c2.tmp rundll32.exe File opened for modification C:\Program Files\ResumeDeny.TTS rundll32.exe File created C:\Program Files\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b170c9ae2a122c2.tmp rundll32.exe File opened for modification C:\Program Files\PushSelect.tiff rundll32.exe File opened for modification C:\Program Files (x86)\6b170c9ae2a122c2.tmp rundll32.exe File opened for modification C:\Program Files\GrantPush.avi rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1492 wrote to memory of 1552 1492 rundll32.exe 24 PID 1552 wrote to memory of 1904 1552 rundll32.exe 29 PID 1552 wrote to memory of 1904 1552 rundll32.exe 29 PID 1552 wrote to memory of 1904 1552 rundll32.exe 29 PID 1552 wrote to memory of 1904 1552 rundll32.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1552 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll,#12⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\system32\wbem\wmic.exe"C:\g\kvfk\dwq\..\..\..\Windows\jf\biw\..\..\system32\gvcit\tk\..\..\wbem\oae\jy\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:1036
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1816