Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 22:48
Static task
static1
Behavioral task
behavioral1
Sample
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
Resource
win10v20201028
General
-
Target
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll
-
Size
230KB
-
MD5
2f78ff32cbb3c478865a88276248d419
-
SHA1
c4401bc85cdf162e3547645005060bd070e231a4
-
SHA256
84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce
-
SHA512
1d989e475b7fbfa1f5c2704b94e7037443ecfe27cca81ade92a28dc91b2cebc1e0b47c6280c794d1020758a90be2f7f4ce98b6827d3c6d2c82610f28afdb2248
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8820099734336a1
https://mazedecrypt.top/8820099734336a1
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Blacklisted process makes network request 13 IoCs
flow pid Process 13 1776 rundll32.exe 14 1776 rundll32.exe 15 1776 rundll32.exe 17 1776 rundll32.exe 18 1776 rundll32.exe 19 1776 rundll32.exe 20 1776 rundll32.exe 21 1776 rundll32.exe 22 1776 rundll32.exe 23 1776 rundll32.exe 25 1776 rundll32.exe 26 1776 rundll32.exe 27 1776 rundll32.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompareTest.raw => C:\Users\Admin\Pictures\CompareTest.raw.cCSVrn rundll32.exe File renamed C:\Users\Admin\Pictures\GetRestart.tiff => C:\Users\Admin\Pictures\GetRestart.tiff.XK0jKj rundll32.exe File renamed C:\Users\Admin\Pictures\InvokeReset.raw => C:\Users\Admin\Pictures\InvokeReset.raw.AOypJh5 rundll32.exe File renamed C:\Users\Admin\Pictures\SyncConvertTo.tif => C:\Users\Admin\Pictures\SyncConvertTo.tif.MxyeN rundll32.exe File opened for modification C:\Users\Admin\Pictures\GetRestart.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\LockUninstall.png => C:\Users\Admin\Pictures\LockUninstall.png.AOypJh5 rundll32.exe File opened for modification C:\Users\Admin\Pictures\RegisterShow.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\RegisterShow.tiff => C:\Users\Admin\Pictures\RegisterShow.tiff.VqVn rundll32.exe File renamed C:\Users\Admin\Pictures\SelectPublish.tif => C:\Users\Admin\Pictures\SelectPublish.tif.000F rundll32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jozwqx7.tmp rundll32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\jozwqx7.tmp rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification C:\Program Files\TraceConfirm.ttf rundll32.exe File opened for modification C:\Program Files\PingProtect.vst rundll32.exe File opened for modification C:\Program Files\SubmitUndo.pptx rundll32.exe File opened for modification C:\Program Files\UpdateShow.wma rundll32.exe File opened for modification C:\Program Files\CloseApprove.jtx rundll32.exe File opened for modification C:\Program Files\GrantDisable.DVR rundll32.exe File opened for modification C:\Program Files\ImportConvertFrom.otf rundll32.exe File opened for modification C:\Program Files\JoinSync.vdx rundll32.exe File opened for modification C:\Program Files\HideConvertFrom.asp rundll32.exe File opened for modification C:\Program Files\HideMeasure.aiff rundll32.exe File opened for modification C:\Program Files\jozwqx7.tmp rundll32.exe File created C:\Program Files\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\CheckpointTrace.hta rundll32.exe File opened for modification C:\Program Files\DisconnectFind.M2TS rundll32.exe File opened for modification C:\Program Files\ExportImport.m4a rundll32.exe File opened for modification C:\Program Files\DenyImport.jfif rundll32.exe File opened for modification C:\Program Files\OutLimit.html rundll32.exe File opened for modification C:\Program Files\RequestShow.mpeg rundll32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt rundll32.exe File opened for modification C:\Program Files\ResumeSwitch.cab rundll32.exe File opened for modification C:\Program Files\SelectLimit.aiff rundll32.exe File opened for modification C:\Program Files (x86)\jozwqx7.tmp rundll32.exe File opened for modification C:\Program Files\FormatEnter.mpg rundll32.exe File opened for modification C:\Program Files\JoinSave.pub rundll32.exe File opened for modification C:\Program Files\LimitCompress.i64 rundll32.exe File opened for modification C:\Program Files\MountDebug.mp3 rundll32.exe File opened for modification C:\Program Files\UninstallRequest.cfg rundll32.exe File opened for modification C:\Program Files\UnlockClose.mht rundll32.exe File opened for modification C:\Program Files\EnableConvertFrom.vbe rundll32.exe File opened for modification C:\Program Files\ResumeCopy.ico rundll32.exe File opened for modification C:\Program Files\UnprotectNew.pot rundll32.exe File opened for modification C:\Program Files\SelectSuspend.mp3 rundll32.exe File opened for modification C:\Program Files\TestBackup.wav rundll32.exe File opened for modification C:\Program Files\BackupResolve.xps rundll32.exe File opened for modification C:\Program Files\ConvertEnable.doc rundll32.exe File opened for modification C:\Program Files\ExportCompress.mhtml rundll32.exe File opened for modification C:\Program Files\RestartInvoke.zip rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 rundll32.exe 1776 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 4068 vssvc.exe Token: SeRestorePrivilege 4068 vssvc.exe Token: SeAuditPrivilege 4068 vssvc.exe Token: SeIncreaseQuotaPrivilege 876 wmic.exe Token: SeSecurityPrivilege 876 wmic.exe Token: SeTakeOwnershipPrivilege 876 wmic.exe Token: SeLoadDriverPrivilege 876 wmic.exe Token: SeSystemProfilePrivilege 876 wmic.exe Token: SeSystemtimePrivilege 876 wmic.exe Token: SeProfSingleProcessPrivilege 876 wmic.exe Token: SeIncBasePriorityPrivilege 876 wmic.exe Token: SeCreatePagefilePrivilege 876 wmic.exe Token: SeBackupPrivilege 876 wmic.exe Token: SeRestorePrivilege 876 wmic.exe Token: SeShutdownPrivilege 876 wmic.exe Token: SeDebugPrivilege 876 wmic.exe Token: SeSystemEnvironmentPrivilege 876 wmic.exe Token: SeRemoteShutdownPrivilege 876 wmic.exe Token: SeUndockPrivilege 876 wmic.exe Token: SeManageVolumePrivilege 876 wmic.exe Token: 33 876 wmic.exe Token: 34 876 wmic.exe Token: 35 876 wmic.exe Token: 36 876 wmic.exe Token: SeIncreaseQuotaPrivilege 876 wmic.exe Token: SeSecurityPrivilege 876 wmic.exe Token: SeTakeOwnershipPrivilege 876 wmic.exe Token: SeLoadDriverPrivilege 876 wmic.exe Token: SeSystemProfilePrivilege 876 wmic.exe Token: SeSystemtimePrivilege 876 wmic.exe Token: SeProfSingleProcessPrivilege 876 wmic.exe Token: SeIncBasePriorityPrivilege 876 wmic.exe Token: SeCreatePagefilePrivilege 876 wmic.exe Token: SeBackupPrivilege 876 wmic.exe Token: SeRestorePrivilege 876 wmic.exe Token: SeShutdownPrivilege 876 wmic.exe Token: SeDebugPrivilege 876 wmic.exe Token: SeSystemEnvironmentPrivilege 876 wmic.exe Token: SeRemoteShutdownPrivilege 876 wmic.exe Token: SeUndockPrivilege 876 wmic.exe Token: SeManageVolumePrivilege 876 wmic.exe Token: 33 876 wmic.exe Token: 34 876 wmic.exe Token: 35 876 wmic.exe Token: 36 876 wmic.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1776 1400 rundll32.exe 70 PID 1400 wrote to memory of 1776 1400 rundll32.exe 70 PID 1400 wrote to memory of 1776 1400 rundll32.exe 70 PID 1776 wrote to memory of 876 1776 rundll32.exe 84 PID 1776 wrote to memory of 876 1776 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\84565919c48c0e959c2981301510228704dd74a7206ed660e7bfda06a980e5ce.dll,#12⤵
- Blacklisted process makes network request
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\system32\wbem\wmic.exe"C:\phc\olee\..\..\Windows\eey\wpwik\gk\..\..\..\system32\opkv\..\wbem\wrr\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:4068