Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-11-2020 07:09
Static task
static1
Behavioral task
behavioral1
Sample
sentinel.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sentinel.dll
Resource
win10v20201028
General
-
Target
sentinel.dll
-
Size
733KB
-
MD5
460cb38e14fcadef06e267047ce9d69e
-
SHA1
b5f99fc2edba2891b6d947aacd3c32be5b43ba4c
-
SHA256
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251
-
SHA512
312cdb07d8b4c278d0afd8de73bfa276cffa2980005ca519cff1f7c06ce8ad4811f4ae791b861d1caa6e2891615eb963800977f2efb739a04b7c54107de1d7f1
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c490cc3fe31229a
https://mazedecrypt.top/6c490cc3fe31229a
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CopyFormat.tif => C:\Users\Admin\Pictures\CopyFormat.tif.NDSxog regsvr32.exe File opened for modification C:\Users\Admin\Pictures\OutUse.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\PopWait.png => C:\Users\Admin\Pictures\PopWait.png.x759 regsvr32.exe File opened for modification C:\Users\Admin\Pictures\RepairMount.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\SyncApprove.png => C:\Users\Admin\Pictures\SyncApprove.png.PLncr regsvr32.exe File renamed C:\Users\Admin\Pictures\CloseResize.raw => C:\Users\Admin\Pictures\CloseResize.raw.SF5SMe regsvr32.exe File renamed C:\Users\Admin\Pictures\CloseUnpublish.crw => C:\Users\Admin\Pictures\CloseUnpublish.crw.SF5SMe regsvr32.exe File renamed C:\Users\Admin\Pictures\OutUse.tiff => C:\Users\Admin\Pictures\OutUse.tiff.x759 regsvr32.exe File renamed C:\Users\Admin\Pictures\PingMerge.tif => C:\Users\Admin\Pictures\PingMerge.tif.x759 regsvr32.exe File renamed C:\Users\Admin\Pictures\RepairMount.tiff => C:\Users\Admin\Pictures\RepairMount.tiff.InSf regsvr32.exe File renamed C:\Users\Admin\Pictures\ResolveUse.raw => C:\Users\Admin\Pictures\ResolveUse.raw.InSf regsvr32.exe File renamed C:\Users\Admin\Pictures\ConvertSend.tif => C:\Users\Admin\Pictures\ConvertSend.tif.SF5SMe regsvr32.exe File renamed C:\Users\Admin\Pictures\OutUnregister.png => C:\Users\Admin\Pictures\OutUnregister.png.G8KZiLV regsvr32.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c490cc3fe31229a.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c490cc3fe31229a.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files\InitializeResize.rle regsvr32.exe File opened for modification C:\Program Files\PushInvoke.mpv2 regsvr32.exe File opened for modification C:\Program Files\SyncOut.sql regsvr32.exe File opened for modification C:\Program Files\CompareGroup.i64 regsvr32.exe File opened for modification C:\Program Files\CompleteExpand.xsl regsvr32.exe File opened for modification C:\Program Files\DebugSet.WTV regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\NewConvertFrom.jpg regsvr32.exe File opened for modification C:\Program Files\StartMove.m3u regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\EnableUnlock.pdf regsvr32.exe File opened for modification C:\Program Files\MountWrite.clr regsvr32.exe File opened for modification C:\Program Files\OutReset.DVR-MS regsvr32.exe File opened for modification C:\Program Files\InvokeSuspend.TS regsvr32.exe File opened for modification C:\Program Files\RequestUnpublish.xps regsvr32.exe File opened for modification C:\Program Files\SetConvertTo.crw regsvr32.exe File opened for modification C:\Program Files\UnpublishInvoke.TTS regsvr32.exe File opened for modification C:\Program Files\UnregisterProtect.i64 regsvr32.exe File opened for modification C:\Program Files\6c490cc3fe31229a.tmp regsvr32.exe File opened for modification C:\Program Files\ClearWrite.crw regsvr32.exe File opened for modification C:\Program Files\ExpandBlock.svg regsvr32.exe File opened for modification C:\Program Files (x86)\6c490cc3fe31229a.tmp regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 regsvr32.exe 2768 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 312 vssvc.exe Token: SeRestorePrivilege 312 vssvc.exe Token: SeAuditPrivilege 312 vssvc.exe Token: SeIncreaseQuotaPrivilege 3992 wmic.exe Token: SeSecurityPrivilege 3992 wmic.exe Token: SeTakeOwnershipPrivilege 3992 wmic.exe Token: SeLoadDriverPrivilege 3992 wmic.exe Token: SeSystemProfilePrivilege 3992 wmic.exe Token: SeSystemtimePrivilege 3992 wmic.exe Token: SeProfSingleProcessPrivilege 3992 wmic.exe Token: SeIncBasePriorityPrivilege 3992 wmic.exe Token: SeCreatePagefilePrivilege 3992 wmic.exe Token: SeBackupPrivilege 3992 wmic.exe Token: SeRestorePrivilege 3992 wmic.exe Token: SeShutdownPrivilege 3992 wmic.exe Token: SeDebugPrivilege 3992 wmic.exe Token: SeSystemEnvironmentPrivilege 3992 wmic.exe Token: SeRemoteShutdownPrivilege 3992 wmic.exe Token: SeUndockPrivilege 3992 wmic.exe Token: SeManageVolumePrivilege 3992 wmic.exe Token: 33 3992 wmic.exe Token: 34 3992 wmic.exe Token: 35 3992 wmic.exe Token: 36 3992 wmic.exe Token: SeIncreaseQuotaPrivilege 3992 wmic.exe Token: SeSecurityPrivilege 3992 wmic.exe Token: SeTakeOwnershipPrivilege 3992 wmic.exe Token: SeLoadDriverPrivilege 3992 wmic.exe Token: SeSystemProfilePrivilege 3992 wmic.exe Token: SeSystemtimePrivilege 3992 wmic.exe Token: SeProfSingleProcessPrivilege 3992 wmic.exe Token: SeIncBasePriorityPrivilege 3992 wmic.exe Token: SeCreatePagefilePrivilege 3992 wmic.exe Token: SeBackupPrivilege 3992 wmic.exe Token: SeRestorePrivilege 3992 wmic.exe Token: SeShutdownPrivilege 3992 wmic.exe Token: SeDebugPrivilege 3992 wmic.exe Token: SeSystemEnvironmentPrivilege 3992 wmic.exe Token: SeRemoteShutdownPrivilege 3992 wmic.exe Token: SeUndockPrivilege 3992 wmic.exe Token: SeManageVolumePrivilege 3992 wmic.exe Token: 33 3992 wmic.exe Token: 34 3992 wmic.exe Token: 35 3992 wmic.exe Token: 36 3992 wmic.exe Token: 33 2900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2900 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 828 wrote to memory of 2768 828 regsvr32.exe 74 PID 828 wrote to memory of 2768 828 regsvr32.exe 74 PID 828 wrote to memory of 2768 828 regsvr32.exe 74 PID 2768 wrote to memory of 3992 2768 regsvr32.exe 82 PID 2768 wrote to memory of 3992 2768 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\sentinel.dll1⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\sentinel.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\wbem\wmic.exe"C:\n\lrdtk\jqqvc\..\..\..\Windows\i\..\system32\yobiv\..\wbem\revhl\bxfn\mdo\..\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:312
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4081⤵
- Suspicious use of AdjustPrivilegeToken
PID:2900