Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-12-2020 21:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20201028
General
-
Target
sample.exe
-
Size
364KB
-
MD5
c9ea6430da4e72b672ce29e56ecad603
-
SHA1
31c3f7b523e1e406d330958e28882227765c3c5e
-
SHA256
dee863ffa251717b8e56a96e2f9f0b41b09897d3c7cb2e8159fcb0ac0783611b
-
SHA512
4a7d30f1c8409299b9df27406fdcdabcdd834d292ebf27f8f0f7766d2a4b7b0cda12307f1d2a79bf1fdefee0bca6638057479ca301ebbb8d6638c0350ba8934e
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/87f6098d8f3af6df
https://mazedecrypt.top/87f6098d8f3af6df
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\AssertShow.tif => C:\Users\Admin\Pictures\AssertShow.tif.ZNhvG sample.exe File renamed C:\Users\Admin\Pictures\CloseComplete.crw => C:\Users\Admin\Pictures\CloseComplete.crw.6k7S9s sample.exe File renamed C:\Users\Admin\Pictures\DisconnectCompress.tif => C:\Users\Admin\Pictures\DisconnectCompress.tif.6k7S9s sample.exe File renamed C:\Users\Admin\Pictures\ExitEnable.raw => C:\Users\Admin\Pictures\ExitEnable.raw.CowT8aw sample.exe File renamed C:\Users\Admin\Pictures\RevokeMove.png => C:\Users\Admin\Pictures\RevokeMove.png.Gr69AeL sample.exe File renamed C:\Users\Admin\Pictures\AddProtect.raw => C:\Users\Admin\Pictures\AddProtect.raw.ZNhvG sample.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\87f6098d8f3af6df.tmp sample.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\87f6098d8f3af6df.tmp sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" sample.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File created C:\Program Files\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\ExportApprove.cfg sample.exe File opened for modification C:\Program Files\InstallOut.mht sample.exe File opened for modification C:\Program Files\AddPop.wmf sample.exe File opened for modification C:\Program Files\CompressDisconnect.M2V sample.exe File opened for modification C:\Program Files\SelectOut.css sample.exe File opened for modification C:\Program Files\SuspendStop.eprtx sample.exe File opened for modification C:\Program Files\MoveStep.vsd sample.exe File opened for modification C:\Program Files\SendCopy.mpp sample.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\LockUnpublish.xltx sample.exe File opened for modification C:\Program Files\NewSet.m1v sample.exe File opened for modification C:\Program Files\ResizeResolve.hta sample.exe File opened for modification C:\Program Files\DismountCompare.doc sample.exe File opened for modification C:\Program Files\GrantSearch.vbs sample.exe File opened for modification C:\Program Files\InvokeRepair.vsdx sample.exe File opened for modification C:\Program Files\RenameFormat.eprtx sample.exe File opened for modification C:\Program Files\SkipReset.dotm sample.exe File opened for modification C:\Program Files (x86)\87f6098d8f3af6df.tmp sample.exe File opened for modification C:\Program Files\BlockPublish.htm sample.exe File opened for modification C:\Program Files\MountEdit.m4a sample.exe File opened for modification C:\Program Files\RenameSwitch.emf sample.exe File opened for modification C:\Program Files\SyncRestart.vstm sample.exe File opened for modification C:\Program Files\87f6098d8f3af6df.tmp sample.exe File opened for modification C:\Program Files\ConvertToUpdate.tif sample.exe File opened for modification C:\Program Files\DismountGrant.fon sample.exe File opened for modification C:\Program Files\StopBackup.7z sample.exe File opened for modification C:\Program Files\DismountAssert.csv sample.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4768 sample.exe 4768 sample.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2496 vssvc.exe Token: SeRestorePrivilege 2496 vssvc.exe Token: SeAuditPrivilege 2496 vssvc.exe Token: SeIncreaseQuotaPrivilege 508 wmic.exe Token: SeSecurityPrivilege 508 wmic.exe Token: SeTakeOwnershipPrivilege 508 wmic.exe Token: SeLoadDriverPrivilege 508 wmic.exe Token: SeSystemProfilePrivilege 508 wmic.exe Token: SeSystemtimePrivilege 508 wmic.exe Token: SeProfSingleProcessPrivilege 508 wmic.exe Token: SeIncBasePriorityPrivilege 508 wmic.exe Token: SeCreatePagefilePrivilege 508 wmic.exe Token: SeBackupPrivilege 508 wmic.exe Token: SeRestorePrivilege 508 wmic.exe Token: SeShutdownPrivilege 508 wmic.exe Token: SeDebugPrivilege 508 wmic.exe Token: SeSystemEnvironmentPrivilege 508 wmic.exe Token: SeRemoteShutdownPrivilege 508 wmic.exe Token: SeUndockPrivilege 508 wmic.exe Token: SeManageVolumePrivilege 508 wmic.exe Token: 33 508 wmic.exe Token: 34 508 wmic.exe Token: 35 508 wmic.exe Token: 36 508 wmic.exe Token: SeIncreaseQuotaPrivilege 508 wmic.exe Token: SeSecurityPrivilege 508 wmic.exe Token: SeTakeOwnershipPrivilege 508 wmic.exe Token: SeLoadDriverPrivilege 508 wmic.exe Token: SeSystemProfilePrivilege 508 wmic.exe Token: SeSystemtimePrivilege 508 wmic.exe Token: SeProfSingleProcessPrivilege 508 wmic.exe Token: SeIncBasePriorityPrivilege 508 wmic.exe Token: SeCreatePagefilePrivilege 508 wmic.exe Token: SeBackupPrivilege 508 wmic.exe Token: SeRestorePrivilege 508 wmic.exe Token: SeShutdownPrivilege 508 wmic.exe Token: SeDebugPrivilege 508 wmic.exe Token: SeSystemEnvironmentPrivilege 508 wmic.exe Token: SeRemoteShutdownPrivilege 508 wmic.exe Token: SeUndockPrivilege 508 wmic.exe Token: SeManageVolumePrivilege 508 wmic.exe Token: 33 508 wmic.exe Token: 34 508 wmic.exe Token: 35 508 wmic.exe Token: 36 508 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4768 wrote to memory of 508 4768 sample.exe 77 PID 4768 wrote to memory of 508 4768 sample.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\wbem\wmic.exe"C:\hymm\xwo\vq\..\..\..\Windows\formy\y\eb\..\..\..\system32\pkjk\..\wbem\r\cfukh\qkybj\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:508
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496