Overview
overview
10Static
static
2b3518937f...bf.dll
windows7_x64
102b3518937f...bf.dll
windows10_x64
104ea8b8c37c...97.dll
windows7_x64
104ea8b8c37c...97.dll
windows10_x64
107c1b18932f...73.dll
windows7_x64
107c1b18932f...73.dll
windows10_x64
10f3c3e2cbed...c8.dll
windows7_x64
10f3c3e2cbed...c8.dll
windows10_x64
10Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-11-2021 07:01
Static task
static1
Behavioral task
behavioral1
Sample
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
2b3518937fd231560c7dc4f5af672a033b1c810d7f2f82c8151c025ce75775bf.dll
Resource
win10-en-20211104
Behavioral task
behavioral3
Sample
4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97.dll
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
4ea8b8c37cfb02ccdba95fe91c12fb68a2b7174fdcbee7ddaadded8ceb0fdf97.dll
Resource
win10-en-20211104
Behavioral task
behavioral5
Sample
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll
Resource
win7-en-20211014
Behavioral task
behavioral6
Sample
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
f3c3e2cbedafd594b40efe12ae2a638489a7065dc2e1657524877fe0bd15d6c8.dll
Resource
win7-en-20211104
Behavioral task
behavioral8
Sample
f3c3e2cbedafd594b40efe12ae2a638489a7065dc2e1657524877fe0bd15d6c8.dll
Resource
win10-en-20211014
General
-
Target
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll
-
Size
486KB
-
MD5
e406d6097c42b81d5bcebe1827e66a19
-
SHA1
09d8c91ccefd699fb5ac1aaebeeebee25170fe1a
-
SHA256
7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373
-
SHA512
77f177824a9e5cfacd6d101ec84a75bf580e9fa707ed4a2bd5213d44b758890bd1922d5709791f20e379b5304efe41b9d8affab6042e51b0e54f5d0919d75020
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c230cc26eb0cf8e
https://mazedecrypt.top/6c230cc26eb0cf8e
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnpublishRequest.raw => C:\Users\Admin\Pictures\UnpublishRequest.raw.Pe2fOe regsvr32.exe File renamed C:\Users\Admin\Pictures\BlockPush.tif => C:\Users\Admin\Pictures\BlockPush.tif.S9b8BBQ regsvr32.exe File renamed C:\Users\Admin\Pictures\CloseEdit.raw => C:\Users\Admin\Pictures\CloseEdit.raw.S9b8BBQ regsvr32.exe File renamed C:\Users\Admin\Pictures\ConfirmJoin.raw => C:\Users\Admin\Pictures\ConfirmJoin.raw.BWAd regsvr32.exe File renamed C:\Users\Admin\Pictures\InvokeStart.crw => C:\Users\Admin\Pictures\InvokeStart.crw.1Xb1Q regsvr32.exe File renamed C:\Users\Admin\Pictures\SearchHide.tif => C:\Users\Admin\Pictures\SearchHide.tif.vra9Lx regsvr32.exe File renamed C:\Users\Admin\Pictures\SyncExit.raw => C:\Users\Admin\Pictures\SyncExit.raw.vra9Lx regsvr32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c230cc26eb0cf8e.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c230cc26eb0cf8e.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files\DebugUnlock.ps1 regsvr32.exe File opened for modification C:\Program Files\DisableRestore.js regsvr32.exe File opened for modification C:\Program Files\ResumeImport.raw regsvr32.exe File opened for modification C:\Program Files\ResumePop.emf regsvr32.exe File opened for modification C:\Program Files\TraceOpen.odt regsvr32.exe File opened for modification C:\Program Files\6c230cc26eb0cf8e.tmp regsvr32.exe File opened for modification C:\Program Files\TraceMove.emz regsvr32.exe File opened for modification C:\Program Files\UnprotectUpdate.pcx regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\NewUnlock.mov regsvr32.exe File opened for modification C:\Program Files\UnprotectLock.docx regsvr32.exe File opened for modification C:\Program Files\LockSkip.avi regsvr32.exe File opened for modification C:\Program Files\RepairTest.cfg regsvr32.exe File opened for modification C:\Program Files\WaitTrace.ex_ regsvr32.exe File opened for modification C:\Program Files\CompressUpdate.csv regsvr32.exe File opened for modification C:\Program Files\ReceivePing.emf regsvr32.exe File opened for modification C:\Program Files\RepairTest.wma regsvr32.exe File opened for modification C:\Program Files\ResolveRevoke.m1v regsvr32.exe File opened for modification C:\Program Files\WaitJoin.dwfx regsvr32.exe File opened for modification C:\Program Files\BlockAdd.gif regsvr32.exe File opened for modification C:\Program Files\ClearStart.jfif regsvr32.exe File opened for modification C:\Program Files\UnprotectRename.vstx regsvr32.exe File opened for modification C:\Program Files (x86)\6c230cc26eb0cf8e.tmp regsvr32.exe File opened for modification C:\Program Files\ClearSet.edrwx regsvr32.exe File opened for modification C:\Program Files\DisableSelect.dot regsvr32.exe File opened for modification C:\Program Files\RequestGroup.ttf regsvr32.exe File opened for modification C:\Program Files\SplitConvertFrom.wmf regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\UnlockMeasure.mpe regsvr32.exe File opened for modification C:\Program Files\UseBackup.ico regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 regsvr32.exe 3068 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 3168 vssvc.exe Token: SeRestorePrivilege 3168 vssvc.exe Token: SeAuditPrivilege 3168 vssvc.exe Token: SeIncreaseQuotaPrivilege 800 wmic.exe Token: SeSecurityPrivilege 800 wmic.exe Token: SeTakeOwnershipPrivilege 800 wmic.exe Token: SeLoadDriverPrivilege 800 wmic.exe Token: SeSystemProfilePrivilege 800 wmic.exe Token: SeSystemtimePrivilege 800 wmic.exe Token: SeProfSingleProcessPrivilege 800 wmic.exe Token: SeIncBasePriorityPrivilege 800 wmic.exe Token: SeCreatePagefilePrivilege 800 wmic.exe Token: SeBackupPrivilege 800 wmic.exe Token: SeRestorePrivilege 800 wmic.exe Token: SeShutdownPrivilege 800 wmic.exe Token: SeDebugPrivilege 800 wmic.exe Token: SeSystemEnvironmentPrivilege 800 wmic.exe Token: SeRemoteShutdownPrivilege 800 wmic.exe Token: SeUndockPrivilege 800 wmic.exe Token: SeManageVolumePrivilege 800 wmic.exe Token: 33 800 wmic.exe Token: 34 800 wmic.exe Token: 35 800 wmic.exe Token: 36 800 wmic.exe Token: SeIncreaseQuotaPrivilege 800 wmic.exe Token: SeSecurityPrivilege 800 wmic.exe Token: SeTakeOwnershipPrivilege 800 wmic.exe Token: SeLoadDriverPrivilege 800 wmic.exe Token: SeSystemProfilePrivilege 800 wmic.exe Token: SeSystemtimePrivilege 800 wmic.exe Token: SeProfSingleProcessPrivilege 800 wmic.exe Token: SeIncBasePriorityPrivilege 800 wmic.exe Token: SeCreatePagefilePrivilege 800 wmic.exe Token: SeBackupPrivilege 800 wmic.exe Token: SeRestorePrivilege 800 wmic.exe Token: SeShutdownPrivilege 800 wmic.exe Token: SeDebugPrivilege 800 wmic.exe Token: SeSystemEnvironmentPrivilege 800 wmic.exe Token: SeRemoteShutdownPrivilege 800 wmic.exe Token: SeUndockPrivilege 800 wmic.exe Token: SeManageVolumePrivilege 800 wmic.exe Token: 33 800 wmic.exe Token: 34 800 wmic.exe Token: 35 800 wmic.exe Token: 36 800 wmic.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3068 2896 regsvr32.exe 69 PID 2896 wrote to memory of 3068 2896 regsvr32.exe 69 PID 2896 wrote to memory of 3068 2896 regsvr32.exe 69 PID 3068 wrote to memory of 800 3068 regsvr32.exe 74 PID 3068 wrote to memory of 800 3068 regsvr32.exe 74
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7c1b18932f622126441802f5ccaa9eefb88465d83a4a527d2c7ca2bab404b373.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\wbem\wmic.exe"C:\slp\..\Windows\alwh\rfy\ak\..\..\..\system32\kfa\gjd\afomu\..\..\..\wbem\au\lxrp\lirp\..\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3168