Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-11-2020 17:43
Static task
static1
Behavioral task
behavioral1
Sample
gx.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
gx.dll
Resource
win10v20201028
General
-
Target
gx.dll
-
Size
486KB
-
MD5
ad099246019b10f5d9a64159c53370ac
-
SHA1
baf152255b473f8da85cea6781935e2102ec868e
-
SHA256
a7f2d3bc5c8f9426267b1f48222a6ad42fa45658a6a9b8c0f1f6045d01bd71e1
-
SHA512
7f1afee0f70c6033d4d2bb14edff3105dcede7a3432e247310031acd094009b43e6eb554ad0310f3100aafbec79aed5e7bbfe60441a3f7988cb8f8b65a70ea22
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b1d0cab166ea71d
https://mazedecrypt.top/6b1d0cab166ea71d
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MergeUpdate.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\MergeUpdate.tiff => C:\Users\Admin\Pictures\MergeUpdate.tiff.OjdyQJ regsvr32.exe File renamed C:\Users\Admin\Pictures\RevokeEnter.crw => C:\Users\Admin\Pictures\RevokeEnter.crw.SPYdgvi regsvr32.exe File renamed C:\Users\Admin\Pictures\UnblockComplete.crw => C:\Users\Admin\Pictures\UnblockComplete.crw.WQAS regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b1d0cab166ea71d.tmp regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\SwitchUpdate.easmx regsvr32.exe File opened for modification C:\Program Files\UnblockEnter.snd regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b1d0cab166ea71d.tmp regsvr32.exe File opened for modification C:\Program Files\MountClose.zip regsvr32.exe File opened for modification C:\Program Files\ResolveExport.crw regsvr32.exe File opened for modification C:\Program Files\StopResolve.dib regsvr32.exe File opened for modification C:\Program Files\PopClose.tif regsvr32.exe File opened for modification C:\Program Files\StartDebug.inf regsvr32.exe File opened for modification C:\Program Files\UseUninstall.emz regsvr32.exe File opened for modification C:\Program Files\EnableNew.xls regsvr32.exe File opened for modification C:\Program Files\GetOptimize.eps regsvr32.exe File opened for modification C:\Program Files\LimitRedo.svg regsvr32.exe File opened for modification C:\Program Files\ShowFormat.mpa regsvr32.exe File opened for modification C:\Program Files\SuspendUndo.txt regsvr32.exe File opened for modification C:\Program Files (x86)\6b1d0cab166ea71d.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b1d0cab166ea71d.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\BlockConvert.DVR-MS regsvr32.exe File opened for modification C:\Program Files\ExpandResume.midi regsvr32.exe File opened for modification C:\Program Files\RepairRestart.pdf regsvr32.exe File opened for modification C:\Program Files\ShowDisconnect.doc regsvr32.exe File opened for modification C:\Program Files\StopOut.xltx regsvr32.exe File opened for modification C:\Program Files\HideResolve.aif regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6b1d0cab166ea71d.tmp regsvr32.exe File opened for modification C:\Program Files\ClearLock.ogg regsvr32.exe File opened for modification C:\Program Files\ImportRevoke.nfo regsvr32.exe File opened for modification C:\Program Files\SearchStop.edrwx regsvr32.exe File opened for modification C:\Program Files\WatchRename.odp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\CopyExport.wma regsvr32.exe File opened for modification C:\Program Files\DenyExport.svg regsvr32.exe File opened for modification C:\Program Files\DenySwitch.ods regsvr32.exe File opened for modification C:\Program Files\GrantOpen.cr2 regsvr32.exe File opened for modification C:\Program Files\OptimizeWrite.rm regsvr32.exe File opened for modification C:\Program Files\RestartSync.xlsb regsvr32.exe File opened for modification C:\Program Files\RevokeRename.scf regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\DenyPush.ico regsvr32.exe File opened for modification C:\Program Files\EditEnable.txt regsvr32.exe File opened for modification C:\Program Files\GetRevoke.aiff regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b1d0cab166ea71d.tmp regsvr32.exe File opened for modification C:\Program Files\FormatWait.aiff regsvr32.exe File opened for modification C:\Program Files\SearchDeny.wma regsvr32.exe File opened for modification C:\Program Files\WaitUse.ps1 regsvr32.exe File opened for modification C:\Program Files\ClearDebug.ttc regsvr32.exe File opened for modification C:\Program Files\ConvertFromLock.svg regsvr32.exe File opened for modification C:\Program Files\FindNew.wmv regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1288 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1084 vssvc.exe Token: SeRestorePrivilege 1084 vssvc.exe Token: SeAuditPrivilege 1084 vssvc.exe Token: SeIncreaseQuotaPrivilege 1520 wmic.exe Token: SeSecurityPrivilege 1520 wmic.exe Token: SeTakeOwnershipPrivilege 1520 wmic.exe Token: SeLoadDriverPrivilege 1520 wmic.exe Token: SeSystemProfilePrivilege 1520 wmic.exe Token: SeSystemtimePrivilege 1520 wmic.exe Token: SeProfSingleProcessPrivilege 1520 wmic.exe Token: SeIncBasePriorityPrivilege 1520 wmic.exe Token: SeCreatePagefilePrivilege 1520 wmic.exe Token: SeBackupPrivilege 1520 wmic.exe Token: SeRestorePrivilege 1520 wmic.exe Token: SeShutdownPrivilege 1520 wmic.exe Token: SeDebugPrivilege 1520 wmic.exe Token: SeSystemEnvironmentPrivilege 1520 wmic.exe Token: SeRemoteShutdownPrivilege 1520 wmic.exe Token: SeUndockPrivilege 1520 wmic.exe Token: SeManageVolumePrivilege 1520 wmic.exe Token: 33 1520 wmic.exe Token: 34 1520 wmic.exe Token: 35 1520 wmic.exe Token: SeIncreaseQuotaPrivilege 1520 wmic.exe Token: SeSecurityPrivilege 1520 wmic.exe Token: SeTakeOwnershipPrivilege 1520 wmic.exe Token: SeLoadDriverPrivilege 1520 wmic.exe Token: SeSystemProfilePrivilege 1520 wmic.exe Token: SeSystemtimePrivilege 1520 wmic.exe Token: SeProfSingleProcessPrivilege 1520 wmic.exe Token: SeIncBasePriorityPrivilege 1520 wmic.exe Token: SeCreatePagefilePrivilege 1520 wmic.exe Token: SeBackupPrivilege 1520 wmic.exe Token: SeRestorePrivilege 1520 wmic.exe Token: SeShutdownPrivilege 1520 wmic.exe Token: SeDebugPrivilege 1520 wmic.exe Token: SeSystemEnvironmentPrivilege 1520 wmic.exe Token: SeRemoteShutdownPrivilege 1520 wmic.exe Token: SeUndockPrivilege 1520 wmic.exe Token: SeManageVolumePrivilege 1520 wmic.exe Token: 33 1520 wmic.exe Token: 34 1520 wmic.exe Token: 35 1520 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1904 wrote to memory of 1288 1904 regsvr32.exe 25 PID 1288 wrote to memory of 1520 1288 regsvr32.exe 34 PID 1288 wrote to memory of 1520 1288 regsvr32.exe 34 PID 1288 wrote to memory of 1520 1288 regsvr32.exe 34 PID 1288 wrote to memory of 1520 1288 regsvr32.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\gx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\gx.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\wbem\wmic.exe"C:\spa\w\wq\..\..\..\Windows\xw\jnrp\ob\..\..\..\system32\lrx\yv\..\..\wbem\ednn\xu\f\..\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1812