Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-12-2020 21:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20201028
General
-
Target
sample.exe
-
Size
364KB
-
MD5
c9ea6430da4e72b672ce29e56ecad603
-
SHA1
31c3f7b523e1e406d330958e28882227765c3c5e
-
SHA256
dee863ffa251717b8e56a96e2f9f0b41b09897d3c7cb2e8159fcb0ac0783611b
-
SHA512
4a7d30f1c8409299b9df27406fdcdabcdd834d292ebf27f8f0f7766d2a4b7b0cda12307f1d2a79bf1fdefee0bca6638057479ca301ebbb8d6638c0350ba8934e
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/87f0097f9ced33e8
https://mazedecrypt.top/87f0097f9ced33e8
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EditStart.tif => C:\Users\Admin\Pictures\EditStart.tif.DJA5 sample.exe File opened for modification C:\Users\Admin\Pictures\MeasureResolve.tiff sample.exe File renamed C:\Users\Admin\Pictures\MeasureResolve.tiff => C:\Users\Admin\Pictures\MeasureResolve.tiff.DJA5 sample.exe File renamed C:\Users\Admin\Pictures\MountFind.tif => C:\Users\Admin\Pictures\MountFind.tif.EIJVZ sample.exe File renamed C:\Users\Admin\Pictures\ResolveUnlock.raw => C:\Users\Admin\Pictures\ResolveUnlock.raw.Gqbeeg sample.exe File renamed C:\Users\Admin\Pictures\WriteResolve.crw => C:\Users\Admin\Pictures\WriteResolve.crw.Gqbeeg sample.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\87f0097f9ced33e8.tmp sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" sample.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification C:\Program Files\MeasurePing.xltx sample.exe File opened for modification C:\Program Files\WaitAssert.mht sample.exe File opened for modification C:\Program Files (x86)\87f0097f9ced33e8.tmp sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\87f0097f9ced33e8.tmp sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\87f0097f9ced33e8.tmp sample.exe File created C:\Program Files\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\87f0097f9ced33e8.tmp sample.exe File opened for modification C:\Program Files\MountRemove.htm sample.exe File opened for modification C:\Program Files\NewRestore.mpeg2 sample.exe File opened for modification C:\Program Files\SwitchSave.mpg sample.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\87f0097f9ced33e8.tmp sample.exe File opened for modification C:\Program Files\InitializeReceive.cfg sample.exe File opened for modification C:\Program Files\MeasureHide.eps sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\LimitRead.au3 sample.exe File opened for modification C:\Program Files\ApproveTest.docm sample.exe File opened for modification C:\Program Files\DismountReceive.MOD sample.exe File opened for modification C:\Program Files\RestartRestore.wmf sample.exe File opened for modification C:\Program Files\SuspendRestore.xltm sample.exe File opened for modification C:\Program Files\DisconnectImport.mp4 sample.exe File opened for modification C:\Program Files\RestartClear.jfif sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 868 sample.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1396 vssvc.exe Token: SeRestorePrivilege 1396 vssvc.exe Token: SeAuditPrivilege 1396 vssvc.exe Token: SeIncreaseQuotaPrivilege 1132 wmic.exe Token: SeSecurityPrivilege 1132 wmic.exe Token: SeTakeOwnershipPrivilege 1132 wmic.exe Token: SeLoadDriverPrivilege 1132 wmic.exe Token: SeSystemProfilePrivilege 1132 wmic.exe Token: SeSystemtimePrivilege 1132 wmic.exe Token: SeProfSingleProcessPrivilege 1132 wmic.exe Token: SeIncBasePriorityPrivilege 1132 wmic.exe Token: SeCreatePagefilePrivilege 1132 wmic.exe Token: SeBackupPrivilege 1132 wmic.exe Token: SeRestorePrivilege 1132 wmic.exe Token: SeShutdownPrivilege 1132 wmic.exe Token: SeDebugPrivilege 1132 wmic.exe Token: SeSystemEnvironmentPrivilege 1132 wmic.exe Token: SeRemoteShutdownPrivilege 1132 wmic.exe Token: SeUndockPrivilege 1132 wmic.exe Token: SeManageVolumePrivilege 1132 wmic.exe Token: 33 1132 wmic.exe Token: 34 1132 wmic.exe Token: 35 1132 wmic.exe Token: SeIncreaseQuotaPrivilege 1132 wmic.exe Token: SeSecurityPrivilege 1132 wmic.exe Token: SeTakeOwnershipPrivilege 1132 wmic.exe Token: SeLoadDriverPrivilege 1132 wmic.exe Token: SeSystemProfilePrivilege 1132 wmic.exe Token: SeSystemtimePrivilege 1132 wmic.exe Token: SeProfSingleProcessPrivilege 1132 wmic.exe Token: SeIncBasePriorityPrivilege 1132 wmic.exe Token: SeCreatePagefilePrivilege 1132 wmic.exe Token: SeBackupPrivilege 1132 wmic.exe Token: SeRestorePrivilege 1132 wmic.exe Token: SeShutdownPrivilege 1132 wmic.exe Token: SeDebugPrivilege 1132 wmic.exe Token: SeSystemEnvironmentPrivilege 1132 wmic.exe Token: SeRemoteShutdownPrivilege 1132 wmic.exe Token: SeUndockPrivilege 1132 wmic.exe Token: SeManageVolumePrivilege 1132 wmic.exe Token: 33 1132 wmic.exe Token: 34 1132 wmic.exe Token: 35 1132 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 868 wrote to memory of 1132 868 sample.exe 33 PID 868 wrote to memory of 1132 868 sample.exe 33 PID 868 wrote to memory of 1132 868 sample.exe 33 PID 868 wrote to memory of 1132 868 sample.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32\wbem\wmic.exe"C:\e\b\..\..\Windows\yptk\uusrt\d\..\..\..\system32\yqw\..\wbem\b\y\bp\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:780