Analysis
-
max time kernel
144s -
max time network
58s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
06-08-2020 08:04
Static task
static1
Behavioral task
behavioral1
Sample
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
Resource
win7
Behavioral task
behavioral2
Sample
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
Resource
win10v200722
General
-
Target
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll
-
Size
368KB
-
MD5
38d00c31a81c5b9e1f468145cda774a3
-
SHA1
d9f6db88ff739713960f7b8d2706ad3f4704b287
-
SHA256
53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028
-
SHA512
5ca3ed455b052e4a3a2b4f784910bc725d507683b98d2ac2aab0b6b258bc49f8cbada57bd6cfcec9f332b9ed2aaf8da59d79be817875826999a700c5c79e1027
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6cfb0ccf3daff8a6
https://mazedecrypt.top/6cfb0ccf3daff8a6
Signatures
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification C:\Program Files\6cfb0ccf3daff8a6.tmp rundll32.exe File opened for modification C:\Program Files\OptimizeComplete.doc rundll32.exe File opened for modification C:\Program Files\OutWatch.wmv rundll32.exe File opened for modification C:\Program Files\RegisterWait.bin rundll32.exe File created C:\Program Files\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\BlockWrite.odt rundll32.exe File opened for modification C:\Program Files\JoinComplete.rtf rundll32.exe File opened for modification C:\Program Files\ResolveEnable.ico rundll32.exe File opened for modification C:\Program Files\SplitRead.php rundll32.exe File opened for modification C:\Program Files (x86)\6cfb0ccf3daff8a6.tmp rundll32.exe File opened for modification C:\Program Files\GetInvoke.TTS rundll32.exe File opened for modification C:\Program Files\LimitReceive.mpeg2 rundll32.exe File opened for modification C:\Program Files\NewInitialize.ods rundll32.exe File opened for modification C:\Program Files\UnpublishFormat.mpv2 rundll32.exe File opened for modification C:\Program Files\AddConnect.pcx rundll32.exe File opened for modification C:\Program Files\GetReceive.mpg rundll32.exe File opened for modification C:\Program Files\LimitInvoke.xlsx rundll32.exe File opened for modification C:\Program Files\ResolveUse.tmp rundll32.exe File opened for modification C:\Program Files\SplitPop.xps rundll32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\FormatCompare.jpg rundll32.exe File opened for modification C:\Program Files\UnlockTrace.vsx rundll32.exe File opened for modification C:\Program Files\AssertUnblock.7z rundll32.exe File opened for modification C:\Program Files\SubmitPush.mid rundll32.exe File opened for modification C:\Program Files\UseRevoke.scf rundll32.exe File opened for modification C:\Program Files\ApproveMount.AAC rundll32.exe File opened for modification C:\Program Files\CheckpointInvoke.xla rundll32.exe File opened for modification C:\Program Files\FindDisconnect.wmf rundll32.exe File opened for modification C:\Program Files\SetUse.docm rundll32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6cfb0ccf3daff8a6.tmp rundll32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6cfb0ccf3daff8a6.tmp rundll32.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" rundll32.exe -
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MountRead.tiff => C:\Users\Admin\Pictures\MountRead.tiff.gBtpP6 rundll32.exe File opened for modification C:\Users\Admin\Pictures\RedoUnprotect.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\RedoUnprotect.tiff => C:\Users\Admin\Pictures\RedoUnprotect.tiff.WCkm3i rundll32.exe File renamed C:\Users\Admin\Pictures\WatchLock.tiff => C:\Users\Admin\Pictures\WatchLock.tiff.ha1wD1 rundll32.exe File renamed C:\Users\Admin\Pictures\GetLimit.png => C:\Users\Admin\Pictures\GetLimit.png.nE9CA rundll32.exe File renamed C:\Users\Admin\Pictures\JoinDisconnect.tif => C:\Users\Admin\Pictures\JoinDisconnect.tif.gBtpP6 rundll32.exe File opened for modification C:\Users\Admin\Pictures\MountRead.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\RevokeBackup.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\RevokeBackup.tiff => C:\Users\Admin\Pictures\RevokeBackup.tiff.Fg9GLN rundll32.exe File opened for modification C:\Users\Admin\Pictures\WatchLock.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\InstallBackup.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\InstallBackup.tiff => C:\Users\Admin\Pictures\InstallBackup.tiff.gBtpP6 rundll32.exe File renamed C:\Users\Admin\Pictures\PopSwitch.crw => C:\Users\Admin\Pictures\PopSwitch.crw.WCkm3i rundll32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 424 wrote to memory of 540 424 rundll32.exe 66 PID 424 wrote to memory of 540 424 rundll32.exe 66 PID 424 wrote to memory of 540 424 rundll32.exe 66 PID 540 wrote to memory of 3928 540 rundll32.exe 73 PID 540 wrote to memory of 3928 540 rundll32.exe 73 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 540 rundll32.exe 540 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 816 vssvc.exe Token: SeRestorePrivilege 816 vssvc.exe Token: SeAuditPrivilege 816 vssvc.exe Token: SeIncreaseQuotaPrivilege 3928 wmic.exe Token: SeSecurityPrivilege 3928 wmic.exe Token: SeTakeOwnershipPrivilege 3928 wmic.exe Token: SeLoadDriverPrivilege 3928 wmic.exe Token: SeSystemProfilePrivilege 3928 wmic.exe Token: SeSystemtimePrivilege 3928 wmic.exe Token: SeProfSingleProcessPrivilege 3928 wmic.exe Token: SeIncBasePriorityPrivilege 3928 wmic.exe Token: SeCreatePagefilePrivilege 3928 wmic.exe Token: SeBackupPrivilege 3928 wmic.exe Token: SeRestorePrivilege 3928 wmic.exe Token: SeShutdownPrivilege 3928 wmic.exe Token: SeDebugPrivilege 3928 wmic.exe Token: SeSystemEnvironmentPrivilege 3928 wmic.exe Token: SeRemoteShutdownPrivilege 3928 wmic.exe Token: SeUndockPrivilege 3928 wmic.exe Token: SeManageVolumePrivilege 3928 wmic.exe Token: 33 3928 wmic.exe Token: 34 3928 wmic.exe Token: 35 3928 wmic.exe Token: 36 3928 wmic.exe Token: SeIncreaseQuotaPrivilege 3928 wmic.exe Token: SeSecurityPrivilege 3928 wmic.exe Token: SeTakeOwnershipPrivilege 3928 wmic.exe Token: SeLoadDriverPrivilege 3928 wmic.exe Token: SeSystemProfilePrivilege 3928 wmic.exe Token: SeSystemtimePrivilege 3928 wmic.exe Token: SeProfSingleProcessPrivilege 3928 wmic.exe Token: SeIncBasePriorityPrivilege 3928 wmic.exe Token: SeCreatePagefilePrivilege 3928 wmic.exe Token: SeBackupPrivilege 3928 wmic.exe Token: SeRestorePrivilege 3928 wmic.exe Token: SeShutdownPrivilege 3928 wmic.exe Token: SeDebugPrivilege 3928 wmic.exe Token: SeSystemEnvironmentPrivilege 3928 wmic.exe Token: SeRemoteShutdownPrivilege 3928 wmic.exe Token: SeUndockPrivilege 3928 wmic.exe Token: SeManageVolumePrivilege 3928 wmic.exe Token: 33 3928 wmic.exe Token: 34 3928 wmic.exe Token: 35 3928 wmic.exe Token: 36 3928 wmic.exe -
Maze
Ransomware family also known as ChaCha.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53bba522663285740d740031f1878f7a4886b582ebcdbddc043afcd0dca70028.dll,#12⤵
- Drops file in Program Files directory
- Drops startup file
- Sets desktop wallpaper using registry
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\system32\wbem\wmic.exe"C:\umfla\cphi\yur\..\..\..\Windows\uw\yoont\pig\..\..\..\system32\wed\..\wbem\hmoq\j\oujr\..\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:816