Analysis
-
max time kernel
165s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 23:05
Static task
static1
Behavioral task
behavioral1
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win10v2004-en-20220113
General
-
Target
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
-
Size
453KB
-
MD5
248c960c1ae54103dea5bfae924f28e2
-
SHA1
504ce8efee0f7f8329c09c6d045a21c795a84b42
-
SHA256
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363
-
SHA512
5b3dd4be33c48cedda5b9270a6454540e837e9611db4d43b35e7290ff7e25dd3b5c0342de6de38f12e8c7d5f291c62ef026236825134d1181e7ba5bdf8103464
Malware Config
Extracted
C:\DECRYPT-FILES.html
<b>[email protected]</b>
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\EnableAssert.tiff 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\Pictures\EnterRestore.tiff 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\EnterRestore.tiff => C:\Users\Admin\Pictures\EnterRestore.tiff.8PG2 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\ExportStep.png => C:\Users\Admin\Pictures\ExportStep.png.8PG2 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\FormatRemove.raw => C:\Users\Admin\Pictures\FormatRemove.raw.8PG2 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\OutPublish.crw => C:\Users\Admin\Pictures\OutPublish.crw.BQfjK 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\RevokeResolve.raw => C:\Users\Admin\Pictures\RevokeResolve.raw.BQfjK 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\ConvertUnprotect.tif => C:\Users\Admin\Pictures\ConvertUnprotect.tif.8PG2 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\WatchCheckpoint.raw => C:\Users\Admin\Pictures\WatchCheckpoint.raw.d2iXx 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\MountClear.raw => C:\Users\Admin\Pictures\MountClear.raw.BQfjK 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\SyncSave.crw => C:\Users\Admin\Pictures\SyncSave.crw.04QYq 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\EnableAssert.tiff => C:\Users\Admin\Pictures\EnableAssert.tiff.8PG2 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.html 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4pcvay.dat 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1592 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1504 wmic.exe Token: SeSecurityPrivilege 1504 wmic.exe Token: SeTakeOwnershipPrivilege 1504 wmic.exe Token: SeLoadDriverPrivilege 1504 wmic.exe Token: SeSystemProfilePrivilege 1504 wmic.exe Token: SeSystemtimePrivilege 1504 wmic.exe Token: SeProfSingleProcessPrivilege 1504 wmic.exe Token: SeIncBasePriorityPrivilege 1504 wmic.exe Token: SeCreatePagefilePrivilege 1504 wmic.exe Token: SeBackupPrivilege 1504 wmic.exe Token: SeRestorePrivilege 1504 wmic.exe Token: SeShutdownPrivilege 1504 wmic.exe Token: SeDebugPrivilege 1504 wmic.exe Token: SeSystemEnvironmentPrivilege 1504 wmic.exe Token: SeRemoteShutdownPrivilege 1504 wmic.exe Token: SeUndockPrivilege 1504 wmic.exe Token: SeManageVolumePrivilege 1504 wmic.exe Token: 33 1504 wmic.exe Token: 34 1504 wmic.exe Token: 35 1504 wmic.exe Token: SeIncreaseQuotaPrivilege 1504 wmic.exe Token: SeSecurityPrivilege 1504 wmic.exe Token: SeTakeOwnershipPrivilege 1504 wmic.exe Token: SeLoadDriverPrivilege 1504 wmic.exe Token: SeSystemProfilePrivilege 1504 wmic.exe Token: SeSystemtimePrivilege 1504 wmic.exe Token: SeProfSingleProcessPrivilege 1504 wmic.exe Token: SeIncBasePriorityPrivilege 1504 wmic.exe Token: SeCreatePagefilePrivilege 1504 wmic.exe Token: SeBackupPrivilege 1504 wmic.exe Token: SeRestorePrivilege 1504 wmic.exe Token: SeShutdownPrivilege 1504 wmic.exe Token: SeDebugPrivilege 1504 wmic.exe Token: SeSystemEnvironmentPrivilege 1504 wmic.exe Token: SeRemoteShutdownPrivilege 1504 wmic.exe Token: SeUndockPrivilege 1504 wmic.exe Token: SeManageVolumePrivilege 1504 wmic.exe Token: 33 1504 wmic.exe Token: 34 1504 wmic.exe Token: 35 1504 wmic.exe Token: SeBackupPrivilege 1528 vssvc.exe Token: SeRestorePrivilege 1528 vssvc.exe Token: SeAuditPrivilege 1528 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1504 1592 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 27 PID 1592 wrote to memory of 1504 1592 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 27 PID 1592 wrote to memory of 1504 1592 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 27 PID 1592 wrote to memory of 1504 1592 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe"C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\wbem\wmic.exe"C:\boph\..\Windows\igygm\..\system32\xdg\jp\..\..\wbem\vv\uj\i\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1528