Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 22:48
Static task
static1
Behavioral task
behavioral1
Sample
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
Resource
win10v20201028
General
-
Target
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
-
Size
230KB
-
MD5
2f78ff32cbb3c478865a88276248d419
-
SHA1
c4401bc85cdf162e3547645005060bd070e231a4
-
SHA256
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce
-
SHA512
1d989e475b7fbfa1f5c2704b94e7037443ecfe27cca81ade92a28dc91b2cebc1e0b47c6280c794d1020758a90be2f7f4ce98b6827d3c6d2c82610f28afdb2248
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/86f4097f2b09b8c7
https://mazedecrypt.top/86f4097f2b09b8c7
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blacklisted process makes network request 9 IoCs
flow pid Process 5 1480 rundll32.exe 6 1480 rundll32.exe 10 1480 rundll32.exe 11 1480 rundll32.exe 12 1480 rundll32.exe 13 1480 rundll32.exe 14 1480 rundll32.exe 15 1480 rundll32.exe 18 1480 rundll32.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RevokeEnter.crw => C:\Users\Admin\Pictures\RevokeEnter.crw.gYPd rundll32.exe File renamed C:\Users\Admin\Pictures\UnblockComplete.crw => C:\Users\Admin\Pictures\UnblockComplete.crw.t1Hyp rundll32.exe File opened for modification C:\Users\Admin\Pictures\MergeUpdate.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\MergeUpdate.tiff => C:\Users\Admin\Pictures\MergeUpdate.tiff.eU38 rundll32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f18nucy7.tmp rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in Program Files directory 49 IoCs
description ioc Process File opened for modification C:\Program Files\StopResolve.dib rundll32.exe File opened for modification C:\Program Files\UnblockEnter.snd rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\f18nucy7.tmp rundll32.exe File opened for modification C:\Program Files\ClearDebug.ttc rundll32.exe File opened for modification C:\Program Files\ImportRevoke.nfo rundll32.exe File opened for modification C:\Program Files\PopClose.tif rundll32.exe File opened for modification C:\Program Files\SearchDeny.wma rundll32.exe File opened for modification C:\Program Files\StartDebug.inf rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\f18nucy7.tmp rundll32.exe File opened for modification C:\Program Files\WaitUse.ps1 rundll32.exe File opened for modification C:\Program Files (x86)\f18nucy7.tmp rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\DenyExport.svg rundll32.exe File opened for modification C:\Program Files\RestartSync.xlsb rundll32.exe File opened for modification C:\Program Files\RevokeRename.scf rundll32.exe File opened for modification C:\Program Files\ShowDisconnect.doc rundll32.exe File opened for modification C:\Program Files\SwitchUpdate.easmx rundll32.exe File opened for modification C:\Program Files\RepairRestart.pdf rundll32.exe File opened for modification C:\Program Files\SearchStop.edrwx rundll32.exe File opened for modification C:\Program Files\ShowFormat.mpa rundll32.exe File created C:\Program Files\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\ClearLock.ogg rundll32.exe File opened for modification C:\Program Files\EnableNew.xls rundll32.exe File opened for modification C:\Program Files\GetRevoke.aiff rundll32.exe File opened for modification C:\Program Files\HideResolve.aif rundll32.exe File opened for modification C:\Program Files\WatchRename.odp rundll32.exe File opened for modification C:\Program Files\ConvertFromLock.svg rundll32.exe File opened for modification C:\Program Files\ResolveExport.crw rundll32.exe File opened for modification C:\Program Files\SuspendUndo.txt rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\BlockConvert.DVR-MS rundll32.exe File opened for modification C:\Program Files\CopyExport.wma rundll32.exe File opened for modification C:\Program Files\ExpandResume.midi rundll32.exe File opened for modification C:\Program Files\GetOptimize.eps rundll32.exe File opened for modification C:\Program Files\MountClose.zip rundll32.exe File opened for modification C:\Program Files\StopOut.xltx rundll32.exe File opened for modification C:\Program Files\DenySwitch.ods rundll32.exe File opened for modification C:\Program Files\EditEnable.txt rundll32.exe File opened for modification C:\Program Files\f18nucy7.tmp rundll32.exe File opened for modification C:\Program Files\FindNew.wmv rundll32.exe File opened for modification C:\Program Files\FormatWait.aiff rundll32.exe File opened for modification C:\Program Files\DenyPush.ico rundll32.exe File opened for modification C:\Program Files\GrantOpen.cr2 rundll32.exe File opened for modification C:\Program Files\UseUninstall.emz rundll32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\f18nucy7.tmp rundll32.exe File opened for modification C:\Program Files\LimitRedo.svg rundll32.exe File opened for modification C:\Program Files\OptimizeWrite.rm rundll32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt rundll32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1480 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1796 vssvc.exe Token: SeRestorePrivilege 1796 vssvc.exe Token: SeAuditPrivilege 1796 vssvc.exe Token: SeIncreaseQuotaPrivilege 568 wmic.exe Token: SeSecurityPrivilege 568 wmic.exe Token: SeTakeOwnershipPrivilege 568 wmic.exe Token: SeLoadDriverPrivilege 568 wmic.exe Token: SeSystemProfilePrivilege 568 wmic.exe Token: SeSystemtimePrivilege 568 wmic.exe Token: SeProfSingleProcessPrivilege 568 wmic.exe Token: SeIncBasePriorityPrivilege 568 wmic.exe Token: SeCreatePagefilePrivilege 568 wmic.exe Token: SeBackupPrivilege 568 wmic.exe Token: SeRestorePrivilege 568 wmic.exe Token: SeShutdownPrivilege 568 wmic.exe Token: SeDebugPrivilege 568 wmic.exe Token: SeSystemEnvironmentPrivilege 568 wmic.exe Token: SeRemoteShutdownPrivilege 568 wmic.exe Token: SeUndockPrivilege 568 wmic.exe Token: SeManageVolumePrivilege 568 wmic.exe Token: 33 568 wmic.exe Token: 34 568 wmic.exe Token: 35 568 wmic.exe Token: SeIncreaseQuotaPrivilege 568 wmic.exe Token: SeSecurityPrivilege 568 wmic.exe Token: SeTakeOwnershipPrivilege 568 wmic.exe Token: SeLoadDriverPrivilege 568 wmic.exe Token: SeSystemProfilePrivilege 568 wmic.exe Token: SeSystemtimePrivilege 568 wmic.exe Token: SeProfSingleProcessPrivilege 568 wmic.exe Token: SeIncBasePriorityPrivilege 568 wmic.exe Token: SeCreatePagefilePrivilege 568 wmic.exe Token: SeBackupPrivilege 568 wmic.exe Token: SeRestorePrivilege 568 wmic.exe Token: SeShutdownPrivilege 568 wmic.exe Token: SeDebugPrivilege 568 wmic.exe Token: SeSystemEnvironmentPrivilege 568 wmic.exe Token: SeRemoteShutdownPrivilege 568 wmic.exe Token: SeUndockPrivilege 568 wmic.exe Token: SeManageVolumePrivilege 568 wmic.exe Token: 33 568 wmic.exe Token: 34 568 wmic.exe Token: 35 568 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1904 wrote to memory of 1480 1904 rundll32.exe 25 PID 1480 wrote to memory of 568 1480 rundll32.exe 34 PID 1480 wrote to memory of 568 1480 rundll32.exe 34 PID 1480 wrote to memory of 568 1480 rundll32.exe 34 PID 1480 wrote to memory of 568 1480 rundll32.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll,#12⤵
- Blacklisted process makes network request
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\wbem\wmic.exe"C:\f\..\Windows\eltb\..\system32\i\..\wbem\tlkc\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1796