Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-11-2020 20:09
Static task
static1
Behavioral task
behavioral1
Sample
5c4de6456271f61616e.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
5c4de6456271f61616e.bin.exe
Resource
win10v20201028
General
-
Target
5c4de6456271f61616e.bin.exe
-
Size
4.9MB
-
MD5
35fe9d41aa9c31a1191ae2e7a3f442aa
-
SHA1
ccbb554db60782a5f6a5317a8718214c0527b766
-
SHA256
c7fb04d2fc49fdb1215a256757b27d06d71c4797e28ad5c4de6456271f61616e
-
SHA512
6e3198270a641b4fe9a21c0f04a7d1f576414d0dc8a9b65fd5be01f3d32ad6e083a381b0f61a6b1b658342912c56d73528ac0661edf13844bea45c1ae3100010
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/86f4097fd3426269
https://mazedecrypt.top/86f4097fd3426269
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\TestWrite.tiff => C:\Users\Admin\Pictures\TestWrite.tiff.M2420Fh 5c4de6456271f61616e.bin.exe File renamed C:\Users\Admin\Pictures\UnpublishUnregister.tif => C:\Users\Admin\Pictures\UnpublishUnregister.tif.M2420Fh 5c4de6456271f61616e.bin.exe File renamed C:\Users\Admin\Pictures\LockWatch.tif => C:\Users\Admin\Pictures\LockWatch.tif.Q7YvcCO 5c4de6456271f61616e.bin.exe File renamed C:\Users\Admin\Pictures\SelectUse.crw => C:\Users\Admin\Pictures\SelectUse.crw.FmdDHEp 5c4de6456271f61616e.bin.exe File opened for modification C:\Users\Admin\Pictures\TestWrite.tiff 5c4de6456271f61616e.bin.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 5c4de6456271f61616e.bin.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files\CopyClear.php 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\MeasureUnblock.vb 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\PingImport.svgz 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\SplitPublish.docx 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\StartInvoke.ini 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\SubmitStep.mpeg 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\WriteSplit.doc 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files (x86)\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\UpdateUninstall.wm 5c4de6456271f61616e.bin.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File created C:\Program Files\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\GroupSelect.MTS 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\ResetSync.emz 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\ConvertCheckpoint.wps 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\UninstallEnable.xlsb 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\RedoMove.jpeg 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\RegisterResume.m3u 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\WriteCopy.7z 5c4de6456271f61616e.bin.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\EnableUse.mpg 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\WaitResolve.jpg 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\86f4097fd3426269.tmp 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\CloseUnlock.i64 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\RestoreMeasure.vst 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\SuspendSet.fon 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\DisableResize.mov 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\PingComplete.xht 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\PopExit.mpe 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\SubmitConnect.mp2v 5c4de6456271f61616e.bin.exe File opened for modification C:\Program Files\SubmitPop.au3 5c4de6456271f61616e.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 240 5c4de6456271f61616e.bin.exe 240 5c4de6456271f61616e.bin.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1288 vssvc.exe Token: SeRestorePrivilege 1288 vssvc.exe Token: SeAuditPrivilege 1288 vssvc.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe Token: SeSystemProfilePrivilege 820 wmic.exe Token: SeSystemtimePrivilege 820 wmic.exe Token: SeProfSingleProcessPrivilege 820 wmic.exe Token: SeIncBasePriorityPrivilege 820 wmic.exe Token: SeCreatePagefilePrivilege 820 wmic.exe Token: SeBackupPrivilege 820 wmic.exe Token: SeRestorePrivilege 820 wmic.exe Token: SeShutdownPrivilege 820 wmic.exe Token: SeDebugPrivilege 820 wmic.exe Token: SeSystemEnvironmentPrivilege 820 wmic.exe Token: SeRemoteShutdownPrivilege 820 wmic.exe Token: SeUndockPrivilege 820 wmic.exe Token: SeManageVolumePrivilege 820 wmic.exe Token: 33 820 wmic.exe Token: 34 820 wmic.exe Token: 35 820 wmic.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe Token: SeSystemProfilePrivilege 820 wmic.exe Token: SeSystemtimePrivilege 820 wmic.exe Token: SeProfSingleProcessPrivilege 820 wmic.exe Token: SeIncBasePriorityPrivilege 820 wmic.exe Token: SeCreatePagefilePrivilege 820 wmic.exe Token: SeBackupPrivilege 820 wmic.exe Token: SeRestorePrivilege 820 wmic.exe Token: SeShutdownPrivilege 820 wmic.exe Token: SeDebugPrivilege 820 wmic.exe Token: SeSystemEnvironmentPrivilege 820 wmic.exe Token: SeRemoteShutdownPrivilege 820 wmic.exe Token: SeUndockPrivilege 820 wmic.exe Token: SeManageVolumePrivilege 820 wmic.exe Token: 33 820 wmic.exe Token: 34 820 wmic.exe Token: 35 820 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 240 wrote to memory of 820 240 5c4de6456271f61616e.bin.exe 33 PID 240 wrote to memory of 820 240 5c4de6456271f61616e.bin.exe 33 PID 240 wrote to memory of 820 240 5c4de6456271f61616e.bin.exe 33 PID 240 wrote to memory of 820 240 5c4de6456271f61616e.bin.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4de6456271f61616e.bin.exe"C:\Users\Admin\AppData\Local\Temp\5c4de6456271f61616e.bin.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\system32\wbem\wmic.exe"C:\p\wtrn\..\..\Windows\pp\b\..\..\system32\jjtxo\gw\mevty\..\..\..\wbem\pmjev\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1108