Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
02-01-2022 11:37
Static task
static1
Behavioral task
behavioral1
Sample
maze.bin.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
maze.bin.exe
Resource
win10-en-20211208
General
-
Target
maze.bin.exe
-
Size
453KB
-
MD5
248c960c1ae54103dea5bfae924f28e2
-
SHA1
504ce8efee0f7f8329c09c6d045a21c795a84b42
-
SHA256
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363
-
SHA512
5b3dd4be33c48cedda5b9270a6454540e837e9611db4d43b35e7290ff7e25dd3b5c0342de6de38f12e8c7d5f291c62ef026236825134d1181e7ba5bdf8103464
Malware Config
Extracted
C:\DECRYPT-FILES.html
<b>[email protected]</b>
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SyncDisable.crw => C:\Users\Admin\Pictures\SyncDisable.crw.HYGPHCd maze.bin.exe File renamed C:\Users\Admin\Pictures\UnprotectComplete.png => C:\Users\Admin\Pictures\UnprotectComplete.png.YvXE maze.bin.exe File renamed C:\Users\Admin\Pictures\UnregisterGrant.tiff => C:\Users\Admin\Pictures\UnregisterGrant.tiff.YvXE maze.bin.exe File renamed C:\Users\Admin\Pictures\ConvertFromAssert.tif => C:\Users\Admin\Pictures\ConvertFromAssert.tif.b53P maze.bin.exe File renamed C:\Users\Admin\Pictures\SwitchGroup.png => C:\Users\Admin\Pictures\SwitchGroup.png.HYGPHCd maze.bin.exe File renamed C:\Users\Admin\Pictures\StartResize.png => C:\Users\Admin\Pictures\StartResize.png.Rr8xvtA maze.bin.exe File opened for modification C:\Users\Admin\Pictures\UnregisterGrant.tiff maze.bin.exe File renamed C:\Users\Admin\Pictures\DisableOptimize.tif => C:\Users\Admin\Pictures\DisableOptimize.tif.b53P maze.bin.exe File renamed C:\Users\Admin\Pictures\SkipComplete.raw => C:\Users\Admin\Pictures\SkipComplete.raw.jtXye4T maze.bin.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.html maze.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mv9z0tnb7.dat maze.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.html maze.bin.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\mv9z0tnb7.dat maze.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\123456789.bmp" maze.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2336 maze.bin.exe 2336 maze.bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1016 wmic.exe Token: SeSecurityPrivilege 1016 wmic.exe Token: SeTakeOwnershipPrivilege 1016 wmic.exe Token: SeLoadDriverPrivilege 1016 wmic.exe Token: SeSystemProfilePrivilege 1016 wmic.exe Token: SeSystemtimePrivilege 1016 wmic.exe Token: SeProfSingleProcessPrivilege 1016 wmic.exe Token: SeIncBasePriorityPrivilege 1016 wmic.exe Token: SeCreatePagefilePrivilege 1016 wmic.exe Token: SeBackupPrivilege 1016 wmic.exe Token: SeRestorePrivilege 1016 wmic.exe Token: SeShutdownPrivilege 1016 wmic.exe Token: SeDebugPrivilege 1016 wmic.exe Token: SeSystemEnvironmentPrivilege 1016 wmic.exe Token: SeRemoteShutdownPrivilege 1016 wmic.exe Token: SeUndockPrivilege 1016 wmic.exe Token: SeManageVolumePrivilege 1016 wmic.exe Token: 33 1016 wmic.exe Token: 34 1016 wmic.exe Token: 35 1016 wmic.exe Token: 36 1016 wmic.exe Token: SeIncreaseQuotaPrivilege 1016 wmic.exe Token: SeSecurityPrivilege 1016 wmic.exe Token: SeTakeOwnershipPrivilege 1016 wmic.exe Token: SeLoadDriverPrivilege 1016 wmic.exe Token: SeSystemProfilePrivilege 1016 wmic.exe Token: SeSystemtimePrivilege 1016 wmic.exe Token: SeProfSingleProcessPrivilege 1016 wmic.exe Token: SeIncBasePriorityPrivilege 1016 wmic.exe Token: SeCreatePagefilePrivilege 1016 wmic.exe Token: SeBackupPrivilege 1016 wmic.exe Token: SeRestorePrivilege 1016 wmic.exe Token: SeShutdownPrivilege 1016 wmic.exe Token: SeDebugPrivilege 1016 wmic.exe Token: SeSystemEnvironmentPrivilege 1016 wmic.exe Token: SeRemoteShutdownPrivilege 1016 wmic.exe Token: SeUndockPrivilege 1016 wmic.exe Token: SeManageVolumePrivilege 1016 wmic.exe Token: 33 1016 wmic.exe Token: 34 1016 wmic.exe Token: 35 1016 wmic.exe Token: 36 1016 wmic.exe Token: SeBackupPrivilege 944 vssvc.exe Token: SeRestorePrivilege 944 vssvc.exe Token: SeAuditPrivilege 944 vssvc.exe Token: SeIncreaseQuotaPrivilege 2392 wmic.exe Token: SeSecurityPrivilege 2392 wmic.exe Token: SeTakeOwnershipPrivilege 2392 wmic.exe Token: SeLoadDriverPrivilege 2392 wmic.exe Token: SeSystemProfilePrivilege 2392 wmic.exe Token: SeSystemtimePrivilege 2392 wmic.exe Token: SeProfSingleProcessPrivilege 2392 wmic.exe Token: SeIncBasePriorityPrivilege 2392 wmic.exe Token: SeCreatePagefilePrivilege 2392 wmic.exe Token: SeBackupPrivilege 2392 wmic.exe Token: SeRestorePrivilege 2392 wmic.exe Token: SeShutdownPrivilege 2392 wmic.exe Token: SeDebugPrivilege 2392 wmic.exe Token: SeSystemEnvironmentPrivilege 2392 wmic.exe Token: SeRemoteShutdownPrivilege 2392 wmic.exe Token: SeUndockPrivilege 2392 wmic.exe Token: SeManageVolumePrivilege 2392 wmic.exe Token: 33 2392 wmic.exe Token: 34 2392 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1016 2336 maze.bin.exe 68 PID 2336 wrote to memory of 1016 2336 maze.bin.exe 68 PID 2336 wrote to memory of 2392 2336 maze.bin.exe 74 PID 2336 wrote to memory of 2392 2336 maze.bin.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"C:\Users\Admin\AppData\Local\Temp\maze.bin.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\system32\wbem\wmic.exe"C:\ghtm\qixh\w\..\..\..\Windows\lwcae\mhj\tg\..\..\..\system32\bgt\qwvmp\emkdo\..\..\..\wbem\utrvc\t\reeoj\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\system32\wbem\wmic.exe"C:\b\..\Windows\ye\..\system32\o\..\wbem\c\lv\gvtae\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:944