Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-08-2021 06:46

General

  • Target

    f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe

  • Size

    351KB

  • MD5

    345d140139d2d11713b06f1cd9a5669e

  • SHA1

    ca3c843964caa54471c136e8fc36bcb3534c1432

  • SHA256

    f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74

  • SHA512

    4e2f2424bb47bbb93972b37fa2657d51f43a5061c7318637cda56bb48ea5fde4277f6a06a4b9e7855a20adbd1eb7ba2444686550fed624428986dc30ea9245c9

Malware Config

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74.bin.bin.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\system32\wbem\wmic.exe
      "C:\r\cgqt\b\..\..\..\Windows\kb\yd\..\..\system32\umxxo\vni\..\..\wbem\vbkef\wha\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3520
    • C:\Windows\system32\wbem\wmic.exe
      "C:\dbq\edbhf\..\..\Windows\cyupr\bgxm\nlx\..\..\..\system32\hul\tmh\khm\..\..\..\wbem\uaatw\xiqtp\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3848
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3844
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x410
    1⤵
      PID:2716

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3520-114-0x0000000000000000-mapping.dmp

    • memory/3848-115-0x0000000000000000-mapping.dmp