Analysis

  • max time kernel
    144s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-08-2021 06:46

General

  • Target

    f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe

  • Size

    351KB

  • MD5

    345d140139d2d11713b06f1cd9a5669e

  • SHA1

    ca3c843964caa54471c136e8fc36bcb3534c1432

  • SHA256

    f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74

  • SHA512

    4e2f2424bb47bbb93972b37fa2657d51f43a5061c7318637cda56bb48ea5fde4277f6a06a4b9e7855a20adbd1eb7ba2444686550fed624428986dc30ea9245c9

Malware Config

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\system32\wbem\wmic.exe
      "C:\ky\bqh\..\..\Windows\jik\..\system32\ve\..\wbem\ajn\aygp\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:888
    • C:\Windows\system32\wbem\wmic.exe
      "C:\hmi\c\..\..\Windows\vfoo\..\system32\ikapy\..\wbem\soug\ich\ylw\..\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1392
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1064
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:1576
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x580
      1⤵
        PID:1596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/888-61-0x0000000000000000-mapping.dmp

      • memory/1392-62-0x0000000000000000-mapping.dmp

      • memory/1700-60-0x0000000075161000-0x0000000075163000-memory.dmp

        Filesize

        8KB