Overview
overview
10Static
static
2b3518937f...bf.dll
windows7_x64
102b3518937f...bf.dll
windows10_x64
104ea8b8c37c...97.dll
windows7_x64
104ea8b8c37c...97.dll
windows10_x64
107c1b18932f...73.dll
windows7_x64
107c1b18932f...73.dll
windows10_x64
10f3c3e2cbed...c8.dll
windows7_x64
10f3c3e2cbed...c8.dll
windows10_x64
10Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
08-11-2021 07:01
Static task
static1
Behavioral task
behavioral1
Sample
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll
Resource
win10-en-20211104
Behavioral task
behavioral3
Sample
4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97.dll
Resource
win10-en-20211104
Behavioral task
behavioral5
Sample
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll
Resource
win7-en-20211014
Behavioral task
behavioral6
Sample
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
f3c3e2cbedafd594b40efe12ae2a638489a7065dc2e1657524877fe0bd15d6c8.dll
Resource
win7-en-20211104
Behavioral task
behavioral8
Sample
f3c3e2cbedafd594b40efe12ae2a638489a7065dc2e1657524877fe0bd15d6c8.dll
Resource
win10-en-20211014
General
-
Target
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll
-
Size
487KB
-
MD5
81bc3a2409991325c6e71a06f6b7b881
-
SHA1
38c88de0ece0451b0665f3616c02c2bad77a92a2
-
SHA256
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf
-
SHA512
eb9a1a865367d97cd17e21d13f3a171f005a927cf3c805c6d9cdb5c6cb39c06a1287e60bc2d98910932d27dd184f42738ecd30f1ec99d10646aed6f2cf76de61
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c850cca114ae82e
https://mazedecrypt.top/6c850cca114ae82e
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UndoNew.tif => C:\Users\Admin\Pictures\UndoNew.tif.QVzqYfY regsvr32.exe File renamed C:\Users\Admin\Pictures\CompareImport.raw => C:\Users\Admin\Pictures\CompareImport.raw.KqMF4 regsvr32.exe File renamed C:\Users\Admin\Pictures\CopyUndo.crw => C:\Users\Admin\Pictures\CopyUndo.crw.bEU3dI regsvr32.exe File renamed C:\Users\Admin\Pictures\DisableSplit.crw => C:\Users\Admin\Pictures\DisableSplit.crw.bEU3dI regsvr32.exe File renamed C:\Users\Admin\Pictures\ReadWatch.raw => C:\Users\Admin\Pictures\ReadWatch.raw.fzDCsUm regsvr32.exe File renamed C:\Users\Admin\Pictures\RevokeFind.crw => C:\Users\Admin\Pictures\RevokeFind.crw.fzDCsUm regsvr32.exe File renamed C:\Users\Admin\Pictures\SearchMove.png => C:\Users\Admin\Pictures\SearchMove.png.fzDCsUm regsvr32.exe File renamed C:\Users\Admin\Pictures\CheckpointOpen.png => C:\Users\Admin\Pictures\CheckpointOpen.png.KqMF4 regsvr32.exe File renamed C:\Users\Admin\Pictures\CheckpointResume.crw => C:\Users\Admin\Pictures\CheckpointResume.crw.KqMF4 regsvr32.exe File renamed C:\Users\Admin\Pictures\ConvertFromPing.crw => C:\Users\Admin\Pictures\ConvertFromPing.crw.bEU3dI regsvr32.exe File renamed C:\Users\Admin\Pictures\ConvertFromSet.raw => C:\Users\Admin\Pictures\ConvertFromSet.raw.bEU3dI regsvr32.exe File renamed C:\Users\Admin\Pictures\JoinAdd.raw => C:\Users\Admin\Pictures\JoinAdd.raw.bEU3dI regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c850cca114ae82e.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 45 IoCs
description ioc Process File opened for modification C:\Program Files\GroupMount.TTS regsvr32.exe File opened for modification C:\Program Files\RequestDisable.potx regsvr32.exe File opened for modification C:\Program Files\UpdateDebug.dotx regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6c850cca114ae82e.tmp regsvr32.exe File opened for modification C:\Program Files\ExpandUninstall.vssx regsvr32.exe File opened for modification C:\Program Files\ConfirmSearch.rtf regsvr32.exe File opened for modification C:\Program Files\EditInitialize.mov regsvr32.exe File opened for modification C:\Program Files\ResumeTest.mp3 regsvr32.exe File opened for modification C:\Program Files\RevokeSkip.snd regsvr32.exe File opened for modification C:\Program Files\BlockGrant.dwfx regsvr32.exe File opened for modification C:\Program Files\DebugPublish.tiff regsvr32.exe File opened for modification C:\Program Files\ImportPublish.ogg regsvr32.exe File opened for modification C:\Program Files\LockSet.cfg regsvr32.exe File opened for modification C:\Program Files\SendMeasure.search-ms regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6c850cca114ae82e.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\ConvertBlock.xml regsvr32.exe File opened for modification C:\Program Files\ApproveTrace.WTV regsvr32.exe File opened for modification C:\Program Files\OutCompress.mpg regsvr32.exe File opened for modification C:\Program Files\StepSwitch.cab regsvr32.exe File opened for modification C:\Program Files\StepUnprotect.wmf regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6c850cca114ae82e.tmp regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\AssertCheckpoint.ogg regsvr32.exe File opened for modification C:\Program Files\DenyCompress.M2T regsvr32.exe File opened for modification C:\Program Files\UnprotectUse.hta regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6c850cca114ae82e.tmp regsvr32.exe File opened for modification C:\Program Files\ExitPing.ps1 regsvr32.exe File opened for modification C:\Program Files\TestWrite.7z regsvr32.exe File opened for modification C:\Program Files\TracePublish.ps1xml regsvr32.exe File opened for modification C:\Program Files\CompareClear.bmp regsvr32.exe File opened for modification C:\Program Files\ConnectSend.asp regsvr32.exe File opened for modification C:\Program Files\ConvertInstall.mpeg3 regsvr32.exe File opened for modification C:\Program Files\EditUse.wpl regsvr32.exe File opened for modification C:\Program Files\FormatEnable.csv regsvr32.exe File opened for modification C:\Program Files\MeasureJoin.dotx regsvr32.exe File opened for modification C:\Program Files\RestoreHide.iso regsvr32.exe File opened for modification C:\Program Files\WriteBackup.ps1 regsvr32.exe File opened for modification C:\Program Files\BlockRevoke.wma regsvr32.exe File opened for modification C:\Program Files (x86)\6c850cca114ae82e.tmp regsvr32.exe File opened for modification C:\Program Files\SuspendStop.avi regsvr32.exe File opened for modification C:\Program Files\ReceiveProtect.mp2 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 668 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 1112 vssvc.exe Token: SeRestorePrivilege 1112 vssvc.exe Token: SeAuditPrivilege 1112 vssvc.exe Token: SeIncreaseQuotaPrivilege 1724 wmic.exe Token: SeSecurityPrivilege 1724 wmic.exe Token: SeTakeOwnershipPrivilege 1724 wmic.exe Token: SeLoadDriverPrivilege 1724 wmic.exe Token: SeSystemProfilePrivilege 1724 wmic.exe Token: SeSystemtimePrivilege 1724 wmic.exe Token: SeProfSingleProcessPrivilege 1724 wmic.exe Token: SeIncBasePriorityPrivilege 1724 wmic.exe Token: SeCreatePagefilePrivilege 1724 wmic.exe Token: SeBackupPrivilege 1724 wmic.exe Token: SeRestorePrivilege 1724 wmic.exe Token: SeShutdownPrivilege 1724 wmic.exe Token: SeDebugPrivilege 1724 wmic.exe Token: SeSystemEnvironmentPrivilege 1724 wmic.exe Token: SeRemoteShutdownPrivilege 1724 wmic.exe Token: SeUndockPrivilege 1724 wmic.exe Token: SeManageVolumePrivilege 1724 wmic.exe Token: 33 1724 wmic.exe Token: 34 1724 wmic.exe Token: 35 1724 wmic.exe Token: SeIncreaseQuotaPrivilege 1724 wmic.exe Token: SeSecurityPrivilege 1724 wmic.exe Token: SeTakeOwnershipPrivilege 1724 wmic.exe Token: SeLoadDriverPrivilege 1724 wmic.exe Token: SeSystemProfilePrivilege 1724 wmic.exe Token: SeSystemtimePrivilege 1724 wmic.exe Token: SeProfSingleProcessPrivilege 1724 wmic.exe Token: SeIncBasePriorityPrivilege 1724 wmic.exe Token: SeCreatePagefilePrivilege 1724 wmic.exe Token: SeBackupPrivilege 1724 wmic.exe Token: SeRestorePrivilege 1724 wmic.exe Token: SeShutdownPrivilege 1724 wmic.exe Token: SeDebugPrivilege 1724 wmic.exe Token: SeSystemEnvironmentPrivilege 1724 wmic.exe Token: SeRemoteShutdownPrivilege 1724 wmic.exe Token: SeUndockPrivilege 1724 wmic.exe Token: SeManageVolumePrivilege 1724 wmic.exe Token: 33 1724 wmic.exe Token: 34 1724 wmic.exe Token: 35 1724 wmic.exe Token: 33 1936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1936 AUDIODG.EXE Token: 33 1936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1936 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 1088 wrote to memory of 668 1088 regsvr32.exe 28 PID 668 wrote to memory of 1724 668 regsvr32.exe 33 PID 668 wrote to memory of 1724 668 regsvr32.exe 33 PID 668 wrote to memory of 1724 668 regsvr32.exe 33 PID 668 wrote to memory of 1724 668 regsvr32.exe 33
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\system32\wbem\wmic.exe"C:\tkby\q\kl\..\..\..\Windows\mt\upokq\..\..\system32\mp\idu\knbmu\..\..\..\wbem\g\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1376
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936