Resubmissions
30-11-2021 09:58
211130-lzqt4sefbn 1030-11-2021 09:26
211130-lejkaseehq 1020-10-2021 09:26
211020-leeakshgem 10Analysis
-
max time kernel
269s -
max time network
273s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
30-11-2021 09:58
Static task
static1
Behavioral task
behavioral1
Sample
4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe
Resource
win11
General
-
Target
4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe
-
Size
898KB
-
MD5
61b32a82577a7ea823ff7303ab6b4283
-
SHA1
9107c719795fa5768498abb4fed11d907e44d55e
-
SHA256
4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167
-
SHA512
86ac9d3d0804f5dd3ebe08ab59058363bceeaa3f42d2d482f97ce688837b3b81693fde2b973250b93ee3223318b0f8e4f2faf6b0f91017807feacabce979d700
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6bf70cb0973755dd
https://mazedecrypt.top/6bf70cb0973755dd
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
suricata: ET MALWARE Maze/ID Ransomware Activity
suricata: ET MALWARE Maze/ID Ransomware Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ExitHide.crw => C:\Users\Admin\Pictures\ExitHide.crw.Q5HKdc 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\ExitUninstall.png => C:\Users\Admin\Pictures\ExitUninstall.png.Q5HKdc 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\FindCompress.png => C:\Users\Admin\Pictures\FindCompress.png.Q5HKdc 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\NewUndo.crw => C:\Users\Admin\Pictures\NewUndo.crw.Fbv7UU7 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\ResetRead.crw => C:\Users\Admin\Pictures\ResetRead.crw.RgWMYwC 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\UnpublishUnprotect.raw => C:\Users\Admin\Pictures\UnpublishUnprotect.raw.vHvz 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\UseImport.png => C:\Users\Admin\Pictures\UseImport.png.vHvz 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\ClearSplit.crw => C:\Users\Admin\Pictures\ClearSplit.crw.gW9E3G 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\DebugMerge.crw => C:\Users\Admin\Pictures\DebugMerge.crw.gW9E3G 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\DismountDisable.crw => C:\Users\Admin\Pictures\DismountDisable.crw.Q5HKdc 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\GroupUnlock.tif => C:\Users\Admin\Pictures\GroupUnlock.tif.Fbv7UU7 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\LimitResolve.raw => C:\Users\Admin\Pictures\LimitResolve.raw.Fbv7UU7 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File renamed C:\Users\Admin\Pictures\SwitchTest.png => C:\Users\Admin\Pictures\SwitchTest.png.vHvz 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6bf70cb0973755dd.tmp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6bf70cb0973755dd.tmp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files\CompressNew.pptm 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ConfirmUpdate.vb 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\DebugGet.vssx 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\LimitShow.wax 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\MeasureClose.3g2 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\OptimizeExpand.cab 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ResolveUnprotect.3gp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\SetPublish.mp3 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ProtectShow.ADTS 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\UnregisterMove.ppsm 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\6bf70cb0973755dd.tmp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ReadUnpublish.ods 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ReceiveSet.rmi 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\SaveDismount.xls 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\UnblockImport.xlsb 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\CloseConfirm.mp3 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ReadReset.bmp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\StopMount.ico 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\ApproveRestore.m4v 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\AssertDisable.aif 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\StartDisable.ps1 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\UnblockCompress.png 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\UnprotectStep.i64 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\CompareUnregister.asx 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\FindExport.clr 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\InvokeConfirm.DVR 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\StartGrant.avi 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files (x86)\6bf70cb0973755dd.tmp 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File created C:\Program Files\DECRYPT-FILES.txt 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\JoinDisconnect.mpeg2 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\JoinPing.wmf 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\OptimizeSwitch.ram 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\RevokeHide.xps 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\RevokeLock.bat 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe File opened for modification C:\Program Files\StepApprove.docx 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 8 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe 8 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2452 vssvc.exe Token: SeRestorePrivilege 2452 vssvc.exe Token: SeAuditPrivilege 2452 vssvc.exe Token: SeIncreaseQuotaPrivilege 1788 wmic.exe Token: SeSecurityPrivilege 1788 wmic.exe Token: SeTakeOwnershipPrivilege 1788 wmic.exe Token: SeLoadDriverPrivilege 1788 wmic.exe Token: SeSystemProfilePrivilege 1788 wmic.exe Token: SeSystemtimePrivilege 1788 wmic.exe Token: SeProfSingleProcessPrivilege 1788 wmic.exe Token: SeIncBasePriorityPrivilege 1788 wmic.exe Token: SeCreatePagefilePrivilege 1788 wmic.exe Token: SeBackupPrivilege 1788 wmic.exe Token: SeRestorePrivilege 1788 wmic.exe Token: SeShutdownPrivilege 1788 wmic.exe Token: SeDebugPrivilege 1788 wmic.exe Token: SeSystemEnvironmentPrivilege 1788 wmic.exe Token: SeRemoteShutdownPrivilege 1788 wmic.exe Token: SeUndockPrivilege 1788 wmic.exe Token: SeManageVolumePrivilege 1788 wmic.exe Token: 33 1788 wmic.exe Token: 34 1788 wmic.exe Token: 35 1788 wmic.exe Token: 36 1788 wmic.exe Token: SeIncreaseQuotaPrivilege 1788 wmic.exe Token: SeSecurityPrivilege 1788 wmic.exe Token: SeTakeOwnershipPrivilege 1788 wmic.exe Token: SeLoadDriverPrivilege 1788 wmic.exe Token: SeSystemProfilePrivilege 1788 wmic.exe Token: SeSystemtimePrivilege 1788 wmic.exe Token: SeProfSingleProcessPrivilege 1788 wmic.exe Token: SeIncBasePriorityPrivilege 1788 wmic.exe Token: SeCreatePagefilePrivilege 1788 wmic.exe Token: SeBackupPrivilege 1788 wmic.exe Token: SeRestorePrivilege 1788 wmic.exe Token: SeShutdownPrivilege 1788 wmic.exe Token: SeDebugPrivilege 1788 wmic.exe Token: SeSystemEnvironmentPrivilege 1788 wmic.exe Token: SeRemoteShutdownPrivilege 1788 wmic.exe Token: SeUndockPrivilege 1788 wmic.exe Token: SeManageVolumePrivilege 1788 wmic.exe Token: 33 1788 wmic.exe Token: 34 1788 wmic.exe Token: 35 1788 wmic.exe Token: 36 1788 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 8 wrote to memory of 1788 8 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe 72 PID 8 wrote to memory of 1788 8 4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe"C:\Users\Admin\AppData\Local\Temp\4263eacd358d5ef9efacff1f63ff79487639136c0268938755a4bfe3f5797167.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\wbem\wmic.exe"C:\nc\awv\iltm\..\..\..\Windows\u\..\system32\a\..\wbem\nc\x\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452