Analysis
-
max time kernel
94s -
max time network
71s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-11-2020 17:43
Static task
static1
Behavioral task
behavioral1
Sample
gx.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
gx.dll
Resource
win10v20201028
General
-
Target
gx.dll
-
Size
486KB
-
MD5
ad099246019b10f5d9a64159c53370ac
-
SHA1
baf152255b473f8da85cea6781935e2102ec868e
-
SHA256
a7f2d3bc5c8f9426267b1f48222a6ad42fa45658a6a9b8c0f1f6045d01bd71e1
-
SHA512
7f1afee0f70c6033d4d2bb14edff3105dcede7a3432e247310031acd094009b43e6eb554ad0310f3100aafbec79aed5e7bbfe60441a3f7988cb8f8b65a70ea22
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c490cc38df0027e
https://mazedecrypt.top/6c490cc38df0027e
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InitializeBlock.crw => C:\Users\Admin\Pictures\InitializeBlock.crw.v2syv regsvr32.exe File renamed C:\Users\Admin\Pictures\PublishStart.png => C:\Users\Admin\Pictures\PublishStart.png.v2syv regsvr32.exe File renamed C:\Users\Admin\Pictures\StepImport.tif => C:\Users\Admin\Pictures\StepImport.tif.ex3xH regsvr32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c490cc38df0027e.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c490cc38df0027e.tmp regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\SubmitUnlock.jpeg regsvr32.exe File opened for modification C:\Program Files\WriteExpand.sql regsvr32.exe File opened for modification C:\Program Files\EnterUpdate.wmx regsvr32.exe File opened for modification C:\Program Files\RemoveSearch.rtf regsvr32.exe File opened for modification C:\Program Files\ResetSkip.tif regsvr32.exe File opened for modification C:\Program Files\SendBackup.avi regsvr32.exe File opened for modification C:\Program Files\ShowDebug.jpe regsvr32.exe File opened for modification C:\Program Files\SubmitConvertFrom.vssx regsvr32.exe File opened for modification C:\Program Files\ApproveClose.search-ms regsvr32.exe File opened for modification C:\Program Files\EnableExport.dxf regsvr32.exe File opened for modification C:\Program Files\GetImport.php regsvr32.exe File opened for modification C:\Program Files\LockDisconnect.gif regsvr32.exe File opened for modification C:\Program Files\PublishExpand.i64 regsvr32.exe File opened for modification C:\Program Files\SyncStep.css regsvr32.exe File opened for modification C:\Program Files (x86)\6c490cc38df0027e.tmp regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6c490cc38df0027e.tmp regsvr32.exe File opened for modification C:\Program Files\DismountClose.xml regsvr32.exe File opened for modification C:\Program Files\LockRestore.htm regsvr32.exe File opened for modification C:\Program Files\RequestWait.avi regsvr32.exe File opened for modification C:\Program Files\SendExport.xla regsvr32.exe File opened for modification C:\Program Files\ConvertToUnblock.eprtx regsvr32.exe File opened for modification C:\Program Files\RedoClose.tmp regsvr32.exe File opened for modification C:\Program Files\UseWrite.cmd regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 744 regsvr32.exe 744 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 908 vssvc.exe Token: SeRestorePrivilege 908 vssvc.exe Token: SeAuditPrivilege 908 vssvc.exe Token: SeIncreaseQuotaPrivilege 2752 wmic.exe Token: SeSecurityPrivilege 2752 wmic.exe Token: SeTakeOwnershipPrivilege 2752 wmic.exe Token: SeLoadDriverPrivilege 2752 wmic.exe Token: SeSystemProfilePrivilege 2752 wmic.exe Token: SeSystemtimePrivilege 2752 wmic.exe Token: SeProfSingleProcessPrivilege 2752 wmic.exe Token: SeIncBasePriorityPrivilege 2752 wmic.exe Token: SeCreatePagefilePrivilege 2752 wmic.exe Token: SeBackupPrivilege 2752 wmic.exe Token: SeRestorePrivilege 2752 wmic.exe Token: SeShutdownPrivilege 2752 wmic.exe Token: SeDebugPrivilege 2752 wmic.exe Token: SeSystemEnvironmentPrivilege 2752 wmic.exe Token: SeRemoteShutdownPrivilege 2752 wmic.exe Token: SeUndockPrivilege 2752 wmic.exe Token: SeManageVolumePrivilege 2752 wmic.exe Token: 33 2752 wmic.exe Token: 34 2752 wmic.exe Token: 35 2752 wmic.exe Token: 36 2752 wmic.exe Token: SeIncreaseQuotaPrivilege 2752 wmic.exe Token: SeSecurityPrivilege 2752 wmic.exe Token: SeTakeOwnershipPrivilege 2752 wmic.exe Token: SeLoadDriverPrivilege 2752 wmic.exe Token: SeSystemProfilePrivilege 2752 wmic.exe Token: SeSystemtimePrivilege 2752 wmic.exe Token: SeProfSingleProcessPrivilege 2752 wmic.exe Token: SeIncBasePriorityPrivilege 2752 wmic.exe Token: SeCreatePagefilePrivilege 2752 wmic.exe Token: SeBackupPrivilege 2752 wmic.exe Token: SeRestorePrivilege 2752 wmic.exe Token: SeShutdownPrivilege 2752 wmic.exe Token: SeDebugPrivilege 2752 wmic.exe Token: SeSystemEnvironmentPrivilege 2752 wmic.exe Token: SeRemoteShutdownPrivilege 2752 wmic.exe Token: SeUndockPrivilege 2752 wmic.exe Token: SeManageVolumePrivilege 2752 wmic.exe Token: 33 2752 wmic.exe Token: 34 2752 wmic.exe Token: 35 2752 wmic.exe Token: 36 2752 wmic.exe Token: 33 896 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 896 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 884 wrote to memory of 744 884 regsvr32.exe 73 PID 884 wrote to memory of 744 884 regsvr32.exe 73 PID 884 wrote to memory of 744 884 regsvr32.exe 73 PID 744 wrote to memory of 2752 744 regsvr32.exe 80 PID 744 wrote to memory of 2752 744 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\gx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\gx.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\wbem\wmic.exe"C:\knx\gaulk\..\..\Windows\swfw\..\system32\c\ffker\..\..\wbem\bmagn\qyftj\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:908
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3701⤵
- Suspicious use of AdjustPrivilegeToken
PID:896