Analysis
-
max time kernel
176s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 23:02
Static task
static1
Behavioral task
behavioral1
Sample
485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe
Resource
win10v2004-en-20220113
General
-
Target
485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe
-
Size
386KB
-
MD5
910509a686df19980eb53da607dceddc
-
SHA1
f93539c26a99a46c85c40abcb0b3aaeb98c86ded
-
SHA256
485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d
-
SHA512
aa45de4dc79dcb1fc5b8626ff134127661be5441b01563bf3550084f3d30971eb7c601776008781cccdc907f69ee5e3287f024701c1c340f88e820e6dc25afef
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8802099c103c94c0
https://mazedecrypt.top/8802099c103c94c0
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\8802099c103c94c0.tmp 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8802099c103c94c0.tmp 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files\8802099c103c94c0.tmp 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ImportEnter.dib 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\PublishCompress.ppsx 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ConfirmFind.docx 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ExpandUpdate.pub 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\MountAssert.vb 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\MoveRename.jpeg 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File created C:\Program Files\DECRYPT-FILES.txt 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\EnterRedo.sql 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\InvokeAdd.pub 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\RevokeRequest.jfif 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\DisconnectFormat.aiff 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\JoinConnect.css 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\MoveEnable.m3u 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\OpenTest.vst 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\SplitDisconnect.ico 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\StartRename.vssx 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ApproveRevoke.vstm 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\EnterPush.gif 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ClearMove.au3 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\EnterResume.3gp2 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\GroupMove.mid 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\RegisterUnpublish.mht 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\CompareConvertTo.3gpp 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ExportEnter.tiff 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\ExportRequest.csv 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\UnpublishTrace.mpa 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\GrantLimit.php 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files\UnblockProtect.vsd 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe File opened for modification C:\Program Files (x86)\8802099c103c94c0.tmp 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4004 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe 4004 485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 2300 vssvc.exe Token: SeRestorePrivilege 2300 vssvc.exe Token: SeAuditPrivilege 2300 vssvc.exe Token: SeShutdownPrivilege 2432 svchost.exe Token: SeCreatePagefilePrivilege 2432 svchost.exe Token: SeShutdownPrivilege 2432 svchost.exe Token: SeCreatePagefilePrivilege 2432 svchost.exe Token: SeShutdownPrivilege 2432 svchost.exe Token: SeCreatePagefilePrivilege 2432 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe"C:\Users\Admin\AppData\Local\Temp\485da83d711d4f9b1f968c7c7e62b30a9987e7cc5a961e5b92a4ab9fcb11611d.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2432