Analysis
-
max time kernel
163s -
max time network
180s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe
Resource
win10v2004-en-20220112
General
-
Target
4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe
-
Size
777KB
-
MD5
f5ecda7dd8bb1c514f93c09cea8ae00d
-
SHA1
f5e03c44b584367241cbd2152fbd99fcc9ccd43f
-
SHA256
4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d
-
SHA512
6ba2928825cced798d61cd1880525cbed4aeb79b04b4ec050e9657dfe06a95c7df3dc663dfc0f71c306af05a1dce1c764a27c4e0662719a7ba1f370af3aeb7d9
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c2d3816b3
https://mazedecrypt.top/892e099c2d3816b3
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SearchResume.tiff => C:\Users\Admin\Pictures\SearchResume.tiff.knlY 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\UseExport.tif => C:\Users\Admin\Pictures\UseExport.tif.JxdqE 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Users\Admin\Pictures\SearchResume.tiff 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\ImportDismount.crw => C:\Users\Admin\Pictures\ImportDismount.crw.WOdFzBA 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\StopSync.png => C:\Users\Admin\Pictures\StopSync.png.R20X 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\SuspendAdd.png => C:\Users\Admin\Pictures\SuspendAdd.png.R20X 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Users\Admin\Pictures\SuspendTrace.tiff 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\SuspendTrace.tiff => C:\Users\Admin\Pictures\SuspendTrace.tiff.R20X 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\UnregisterWait.raw => C:\Users\Admin\Pictures\UnregisterWait.raw.R20X 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File renamed C:\Users\Admin\Pictures\CompareApprove.crw => C:\Users\Admin\Pictures\CompareApprove.crw.nhm0wi 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files\ExportRepair.3gp2 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\PopResume.doc 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\RequestNew.fon 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\CheckpointGet.M2T 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\DebugRepair.ex_ 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files (x86)\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\CompleteSwitch.vssm 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\EditCheckpoint.aiff 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\ConvertCompare.xlsb 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\MeasureStart.inf 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\SetSuspend.cmd 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\AddShow.kix 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\SearchResolve.cr2 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\UnprotectDisconnect.wps 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\GrantUnregister.css 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\RegisterUninstall.M2V 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\SubmitStep.xlsx 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\DismountUnblock.asf 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\ResetSelect.vsdm 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099c2d3816b3.tmp 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\ConvertToJoin.wax 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\RestartPop.lock 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\OpenRename.001 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\RestoreConvertTo.3gp2 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\ConfirmStart.xps 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\ConnectExpand.m4a 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\RestoreUninstall.gif 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File created C:\Program Files\DECRYPT-FILES.txt 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe File opened for modification C:\Program Files\GrantJoin.wmf 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1564 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 560 vssvc.exe Token: SeRestorePrivilege 560 vssvc.exe Token: SeAuditPrivilege 560 vssvc.exe Token: SeIncreaseQuotaPrivilege 1776 wmic.exe Token: SeSecurityPrivilege 1776 wmic.exe Token: SeTakeOwnershipPrivilege 1776 wmic.exe Token: SeLoadDriverPrivilege 1776 wmic.exe Token: SeSystemProfilePrivilege 1776 wmic.exe Token: SeSystemtimePrivilege 1776 wmic.exe Token: SeProfSingleProcessPrivilege 1776 wmic.exe Token: SeIncBasePriorityPrivilege 1776 wmic.exe Token: SeCreatePagefilePrivilege 1776 wmic.exe Token: SeBackupPrivilege 1776 wmic.exe Token: SeRestorePrivilege 1776 wmic.exe Token: SeShutdownPrivilege 1776 wmic.exe Token: SeDebugPrivilege 1776 wmic.exe Token: SeSystemEnvironmentPrivilege 1776 wmic.exe Token: SeRemoteShutdownPrivilege 1776 wmic.exe Token: SeUndockPrivilege 1776 wmic.exe Token: SeManageVolumePrivilege 1776 wmic.exe Token: 33 1776 wmic.exe Token: 34 1776 wmic.exe Token: 35 1776 wmic.exe Token: SeIncreaseQuotaPrivilege 1776 wmic.exe Token: SeSecurityPrivilege 1776 wmic.exe Token: SeTakeOwnershipPrivilege 1776 wmic.exe Token: SeLoadDriverPrivilege 1776 wmic.exe Token: SeSystemProfilePrivilege 1776 wmic.exe Token: SeSystemtimePrivilege 1776 wmic.exe Token: SeProfSingleProcessPrivilege 1776 wmic.exe Token: SeIncBasePriorityPrivilege 1776 wmic.exe Token: SeCreatePagefilePrivilege 1776 wmic.exe Token: SeBackupPrivilege 1776 wmic.exe Token: SeRestorePrivilege 1776 wmic.exe Token: SeShutdownPrivilege 1776 wmic.exe Token: SeDebugPrivilege 1776 wmic.exe Token: SeSystemEnvironmentPrivilege 1776 wmic.exe Token: SeRemoteShutdownPrivilege 1776 wmic.exe Token: SeUndockPrivilege 1776 wmic.exe Token: SeManageVolumePrivilege 1776 wmic.exe Token: 33 1776 wmic.exe Token: 34 1776 wmic.exe Token: 35 1776 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1776 1564 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe 35 PID 1564 wrote to memory of 1776 1564 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe 35 PID 1564 wrote to memory of 1776 1564 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe 35 PID 1564 wrote to memory of 1776 1564 4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe"C:\Users\Admin\AppData\Local\Temp\4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\wbem\wmic.exe"C:\s\..\Windows\jsmff\f\..\..\system32\jq\ix\eni\..\..\..\wbem\m\o\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1900