Analysis
-
max time kernel
87s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-11-2020 07:09
Static task
static1
Behavioral task
behavioral1
Sample
sentinel.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sentinel.dll
Resource
win10v20201028
General
-
Target
sentinel.dll
-
Size
733KB
-
MD5
460cb38e14fcadef06e267047ce9d69e
-
SHA1
b5f99fc2edba2891b6d947aacd3c32be5b43ba4c
-
SHA256
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251
-
SHA512
312cdb07d8b4c278d0afd8de73bfa276cffa2980005ca519cff1f7c06ce8ad4811f4ae791b861d1caa6e2891615eb963800977f2efb739a04b7c54107de1d7f1
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b1d0cab5db0ab76
https://mazedecrypt.top/6b1d0cab5db0ab76
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConnectUninstall.tif => C:\Users\Admin\Pictures\ConnectUninstall.tif.g6MW regsvr32.exe File renamed C:\Users\Admin\Pictures\MergeEnable.raw => C:\Users\Admin\Pictures\MergeEnable.raw.QbUJ regsvr32.exe File renamed C:\Users\Admin\Pictures\ReceiveRedo.tif => C:\Users\Admin\Pictures\ReceiveRedo.tif.QbUJ regsvr32.exe File renamed C:\Users\Admin\Pictures\StartReset.crw => C:\Users\Admin\Pictures\StartReset.crw.8KMNR regsvr32.exe File opened for modification C:\Users\Admin\Pictures\DebugTest.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\DebugTest.tiff => C:\Users\Admin\Pictures\DebugTest.tiff.g6MW regsvr32.exe File renamed C:\Users\Admin\Pictures\HideNew.png => C:\Users\Admin\Pictures\HideNew.png.QbUJ regsvr32.exe File renamed C:\Users\Admin\Pictures\RemoveMount.png => C:\Users\Admin\Pictures\RemoveMount.png.QbUJ regsvr32.exe File renamed C:\Users\Admin\Pictures\RequestGet.raw => C:\Users\Admin\Pictures\RequestGet.raw.QbUJ regsvr32.exe File renamed C:\Users\Admin\Pictures\UnlockResolve.tif => C:\Users\Admin\Pictures\UnlockResolve.tif.8KMNR regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b1d0cab5db0ab76.tmp regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b1d0cab5db0ab76.tmp regsvr32.exe File opened for modification C:\Program Files\ReceiveRestart.m4v regsvr32.exe File opened for modification C:\Program Files (x86)\6b1d0cab5db0ab76.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b1d0cab5db0ab76.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\ConfirmLimit.bat regsvr32.exe File opened for modification C:\Program Files\LimitInstall.emf regsvr32.exe File opened for modification C:\Program Files\ProtectUnblock.mpg regsvr32.exe File opened for modification C:\Program Files\AddSplit.png regsvr32.exe File opened for modification C:\Program Files\CompleteRepair.vbe regsvr32.exe File opened for modification C:\Program Files\SkipRequest.raw regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b1d0cab5db0ab76.tmp regsvr32.exe File opened for modification C:\Program Files\SuspendSync.aifc regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6b1d0cab5db0ab76.tmp regsvr32.exe File opened for modification C:\Program Files\CheckpointNew.3gp regsvr32.exe File opened for modification C:\Program Files\EnterEnable.mpv2 regsvr32.exe File opened for modification C:\Program Files\PushExit.eps regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1848 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1700 vssvc.exe Token: SeRestorePrivilege 1700 vssvc.exe Token: SeAuditPrivilege 1700 vssvc.exe Token: SeIncreaseQuotaPrivilege 1928 wmic.exe Token: SeSecurityPrivilege 1928 wmic.exe Token: SeTakeOwnershipPrivilege 1928 wmic.exe Token: SeLoadDriverPrivilege 1928 wmic.exe Token: SeSystemProfilePrivilege 1928 wmic.exe Token: SeSystemtimePrivilege 1928 wmic.exe Token: SeProfSingleProcessPrivilege 1928 wmic.exe Token: SeIncBasePriorityPrivilege 1928 wmic.exe Token: SeCreatePagefilePrivilege 1928 wmic.exe Token: SeBackupPrivilege 1928 wmic.exe Token: SeRestorePrivilege 1928 wmic.exe Token: SeShutdownPrivilege 1928 wmic.exe Token: SeDebugPrivilege 1928 wmic.exe Token: SeSystemEnvironmentPrivilege 1928 wmic.exe Token: SeRemoteShutdownPrivilege 1928 wmic.exe Token: SeUndockPrivilege 1928 wmic.exe Token: SeManageVolumePrivilege 1928 wmic.exe Token: 33 1928 wmic.exe Token: 34 1928 wmic.exe Token: 35 1928 wmic.exe Token: SeIncreaseQuotaPrivilege 1928 wmic.exe Token: SeSecurityPrivilege 1928 wmic.exe Token: SeTakeOwnershipPrivilege 1928 wmic.exe Token: SeLoadDriverPrivilege 1928 wmic.exe Token: SeSystemProfilePrivilege 1928 wmic.exe Token: SeSystemtimePrivilege 1928 wmic.exe Token: SeProfSingleProcessPrivilege 1928 wmic.exe Token: SeIncBasePriorityPrivilege 1928 wmic.exe Token: SeCreatePagefilePrivilege 1928 wmic.exe Token: SeBackupPrivilege 1928 wmic.exe Token: SeRestorePrivilege 1928 wmic.exe Token: SeShutdownPrivilege 1928 wmic.exe Token: SeDebugPrivilege 1928 wmic.exe Token: SeSystemEnvironmentPrivilege 1928 wmic.exe Token: SeRemoteShutdownPrivilege 1928 wmic.exe Token: SeUndockPrivilege 1928 wmic.exe Token: SeManageVolumePrivilege 1928 wmic.exe Token: 33 1928 wmic.exe Token: 34 1928 wmic.exe Token: 35 1928 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 844 wrote to memory of 1848 844 regsvr32.exe 26 PID 1848 wrote to memory of 1928 1848 regsvr32.exe 34 PID 1848 wrote to memory of 1928 1848 regsvr32.exe 34 PID 1848 wrote to memory of 1928 1848 regsvr32.exe 34 PID 1848 wrote to memory of 1928 1848 regsvr32.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\sentinel.dll1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\sentinel.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\wbem\wmic.exe"C:\yqeyd\c\fwr\..\..\..\Windows\nuj\..\system32\tlej\yo\..\..\wbem\c\s\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1044