General
Target

284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe

Filesize

643KB

Completed

16-02-2022 23:13

Task

behavioral2

Score
10/10
MD5

d3eaab616883fcf51dcbdb4769dd86df

SHA1

c2a509a5bf4a1b3d75877649996e7f5f3f495ad4

SHA256

284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab

SHA256

fd65824e554cc85187404f8b1c7a72be5496555c6354dd5566dbba8ecfb91c0e813b17aca08b910274b9fc083c02f8b753c0ca2d5d8fdd0bd79be1996eef69de

Malware Config

Extracted

Path

C:\DECRYPT-FILES.txt

Family

maze

Ransom Note
Attention! ---------------------------- | What happened? ---------------------------- All your files, documents, photos, databases, and other important data are safely encrypted with reliable algorithms. You cannot access the files right now. But do not worry. You have a chance! It is easy to recover in a few steps. ---------------------------- | How to get my files back? ---------------------------- The only method to restore your files is to purchase a unique for you private key which is securely stored on our servers. To contact us and purchase the key you have to visit our website in a hidden TOR network. There are general 2 ways to reach us: 1) [Recommended] Using hidden TOR network. a) Download a special TOR browser: https://www.torproject.org/ b) Install the TOR Browser. c) Open the TOR Browser. d) Open our website in the TOR browser: http://aoacugmutagkwctu.onion/8802099ca906eab2 e) Follow the instructions on this page. 2) If you have any problems connecting or using TOR network a) Open our website: https://mazedecrypt.top/8802099ca906eab2 b) Follow the instructions on this page. Warning: the second (2) method can be blocked in some countries. That is why the first (1) method is recommended to use. On this page, you will see instructions on how to make a free decryption test and how to pay. Also it has a live chat with our operators and support team. ---------------------------- | What about guarantees? ---------------------------- We understand your stress and worry. So you have a FREE opportunity to test a service by instantly decrypting for free three files on your computer! If you have any problems our friendly support team is always here to assist you in a live chat! ------------------------------------------------------------------------------- THIS IS A SPECIAL BLOCK WITH A PERSONAL AND CONFIDENTIAL INFORMATION! DO NOT TOUCH IT WE NEED IT TO IDENTIFY AND AUTHORIZE YOU ---BEGIN MAZE KEY--- 9fXTMvJYmdzk8YmGTvRYjZayAnEZmX7dZ3baNHd3TT6l3MY4CgvmkCw0r0CqOAscGip6fC5GtS8H9lTC4MINT9TBOqGFD/9DSWbUpS4FWiLA8eATEuq11tSECgDwaFvXPGUlqklYTNaUfoR9T0KWmiKIB5wQ2+w1rokIfdeYwz9MkgN6nGtKEtFLsU2JVZB+a+YKupgl3aXaVRsqA3VJi4UHDj4coMnmmj4icb2t1AzrXSvU1WK9QnDlGj8aiIosSS7U6kaCF+MC85fHIkZAjl0ulpfEXeWwRin0gfO5xPocCcWIP7MuB8pkaRrhUk7jNqSH2IjLfOCyjMbnrdTr/0cb4Tl6ds911yNi/TXHbg7gKH9fHA7k3S2pKIoyCU3SxHjpQ0CUqSC5Q8VaO1ur0AQCkO5jcJ34HL2CEAwRWDsz90t9BsbeIjQBVSoarda2OWb5gSw28XRy7XfEmSFk1MVzCb4VBzCfiH3GyOXzqdvGfyNlfSu9OjgDsr27PZJhmxfR2sD7vq0QRewApWb65JMHMcTNcqE/Oa7Zl2IUNN5P9QV0l8dTXNn/DTJxLGaQiKgt7A0NE9q6zw3+BoejVvzzSICZ/VadjblylPocQLx3emku0RbGDazRgcgEOosD2JYAEmKFZ/ssnOQ//JCYsqGtDUIin2DFOC1P94LI8sLDx/WQHDKUIsXll2s0LCeW8GfrXD9yfiG+SVS7FGHttocnuFlWqIpINgszQ4cCqrby1E/sQXg3CjuN1sVW8uIFVzXQQHP+4okTx07XqWM9m1VsaiqJhiw78wvhETgAqDJtXFW80/33NQc/0jviF1E5Bllj6naoIg0fc5KHv+YALn1EeNVPckfOP4vf/9OaRbx2rDvv12JTZQpc/gyJmwDx7yCz7hMrTcAEi+hSaCMm9dwc7xAO/J8i8yczxZBSV6F2UkNAGrfNkVjRR+HVLa4EKKdZNwXRz7Ox1pPKLL8Z0HSZkvYDTWc/ItIZnK32/eN8zGz39J4BtZQ8MjOfKdUczmuCouecEGbKvRmA9avJyQVzvkCiddydoaJVw5RI7biu7u6gvPwXiDmAFgi75BRMgdLl1tyX5w7DH5RcIzF4gAUhIPLaRPxvsvSCmWjLisxOZx4fIgt38LP+j+FIHJRgZ2Lo/0OAclutAa2sI6IE2t1EcfJEkkhkoYnsB+GXz2aEaluhRz2bd8nG3u3Hl2w4iZtiRVtPyiNSthrdJso/o91TXn+CNvACxE90MHYBFYa55Wal665M2BJ632XBZdEjrYMIx/v1QCgU+du01yIj504komq5pneZ8y03N34weGRzpCIXvMk4hc4VcyfVvQHtmQ5CsEIf12v/25FesP3KIcAXGBjmowB7C6xT1Cxhdg4UdGN4Y+dDLLIrI4jJ7CwJeIRQXLEekfmF6VRAUoYLiOBncqRNXE7v9lrwJr7Wia64ZXpn1DRLJ0OXA39gawmxyepwPIbKksF4y/1aGg1tPFLFW9zL7tF6a7NzWMo0njCCtcSzwlOpkFZ3h9fc9UCDXH9+AAiF2USuHehnqiRj10xfvuu7xT/jEcAZsFmLv9E94znqqzD8AvjQBE2mB7mfnu1wQQ94MckP3/2w/q73hn5qzNxJoGLYXdAnz2COAkBDZkMYOm78vFL/N3QeGsBqblN9/aCzGc0YGaZ6eci1MgH+ZpzVRZQ3kwpe/jYeX222ypEH3lLuFgBDi7Y4MP9xvYpeP8to3KTlAZehWC4G8qh0aYt7+fIYdWnpboBnFW2h35OvK9RMX1BOywnG3BTOjxATWIA7MmDuhTqSZPYbqZ2F46rPNFOIE9zwQN6J8f8/0Sufc7z1RvAHJYmgCLWRpyZkqyhnrP3J0Q/DWFk37I+F+GjloDeasB2fgktEBx9smwQ1ezM5/X+YHhSitqeDw62vmd40pv9OBO2cTBlZrw72pJxnt1Nr9+g7ze9pmxG/hEqFV5zW7LthyWsgCSM6nm51LbSUfEo+t0X47+gCxZNmrrRPjNc9qurK5ZahgPq0aweHJucmVpcXcOIDbWzmm1/KrGon1yMie0yanDjQq5VQ6ARFNF1cBb/3FiOXoZuzuwfitS2uQcGyN+gl0ctpPOxkSSW9qeKVtow4o+e9Nf1/jLNYRvu+FCpyP/bA+RfOMOeDXZHU4U8DwGV6rjTuUNcMSfAaEYfwN8QvdzHTR1cOtT15mHcNnrfyvvhZIN4A29/O9wi7K0+0wKojyp2yoaoWegoiOAA4ADAAMgAwADkAOQBjAGEAOQAwADYAZQBhAGIAMgAAABCAYBoMQQBkAG0AaQBuAAAAIhJKAEQAUQBQAFgATwBQAFIAAAAqDG4AbwBuAGUAfAAAADIsVwBpAG4AZABvAHcAcwAgADEAMAAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAAABCNnwAQwBfAEYAXwAyADAANAA3ADkALwAyADYAMQA4ADQAMQB8AEQAXwBVAF8AMAAvADAAfAAAAEgAUEBYiQhgiQhoiQhw2u+3DngQgAEBigEFMi4xLjE= ---END MAZE KEY---
URLs

http://aoacugmutagkwctu.onion/8802099ca906eab2

https://mazedecrypt.top/8802099ca906eab2

Signatures 7

Filter: none

Collection
Credential Access
  • Maze

    Description

    Ransomware family also known as ChaCha.

  • Drops startup file
    284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe

    Reported IOCs

    descriptioniocprocess
    File createdC:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\8802099ca906eab2.tmp284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File createdC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8802099ca906eab2.tmp284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    TTPs

    Data from Local SystemCredentials in Files
  • Drops file in Program Files directory
    284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Program Files\PublishUnregister.au284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\UninstallOptimize.pot284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\UnprotectClose.html284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\DisconnectSend.php284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\EnableGroup.html284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ExitNew.MOD284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\GetOptimize.xltx284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\WriteExport.ods284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\GetResize.mhtml284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\StepPop.mp4284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\MoveSelect.ini284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\PublishEdit.ps1xml284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File createdC:\Program Files (x86)\DECRYPT-FILES.txt284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files (x86)\8802099ca906eab2.tmp284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ConvertFromSwitch.avi284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\DismountOut.vst284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\EditMount.iso284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\8802099ca906eab2.tmp284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\AddRestart.emz284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ExitUnprotect.eps284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\SaveUnblock.crw284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\SelectOut.shtml284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\WriteConnect.txt284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\BackupFormat.wm284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ConfirmExpand.ini284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ReadNew.wmv284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ResetGrant.bin284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File createdC:\Program Files\DECRYPT-FILES.txt284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\AssertUninstall.cr2284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\ConfirmRepair.vssm284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\OpenSkip.potx284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    File opened for modificationC:\Program Files\TraceOut.sql284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
  • Drops file in Windows directory
    svchost.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\SoftwareDistribution\ReportingEvents.logsvchost.exe
    File opened for modificationC:\Windows\WindowsUpdate.logsvchost.exe
    File opened for modificationC:\Windows\SoftwareDistribution\DataStore\Logs\edb.chksvchost.exe
    File opened for modificationC:\Windows\SoftwareDistribution\DataStore\Logs\edb.logsvchost.exe
    File opened for modificationC:\Windows\SoftwareDistribution\DataStore\DataStore.edbsvchost.exe
    File opened for modificationC:\Windows\SoftwareDistribution\DataStore\DataStore.jfmsvchost.exe
  • Suspicious behavior: EnumeratesProcesses
    284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe

    Reported IOCs

    pidprocess
    1208284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    1208284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
  • Suspicious use of AdjustPrivilegeToken
    vssvc.exesvchost.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeBackupPrivilege1048vssvc.exe
    Token: SeRestorePrivilege1048vssvc.exe
    Token: SeAuditPrivilege1048vssvc.exe
    Token: SeShutdownPrivilege1968svchost.exe
    Token: SeCreatePagefilePrivilege1968svchost.exe
    Token: SeShutdownPrivilege1968svchost.exe
    Token: SeCreatePagefilePrivilege1968svchost.exe
    Token: SeShutdownPrivilege1968svchost.exe
    Token: SeCreatePagefilePrivilege1968svchost.exe
Processes 3
  • C:\Users\Admin\AppData\Local\Temp\284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe
    "C:\Users\Admin\AppData\Local\Temp\284b294160d8af073b668443204ea9f49d93f12d3ea1e030106eb43c1ae2b1ab.exe"
    Drops startup file
    Drops file in Program Files directory
    Suspicious behavior: EnumeratesProcesses
    PID:1208
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    Suspicious use of AdjustPrivilegeToken
    PID:1048
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    Drops file in Windows directory
    Suspicious use of AdjustPrivilegeToken
    PID:1968
Network
MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Discovery
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Replay Monitor
                      00:00 00:00
                      Downloads
                      • memory/1208-130-0x0000000000600000-0x00000000006A0000-memory.dmp

                      • memory/1208-131-0x0000000000400000-0x00000000004A0000-memory.dmp

                      • memory/1968-132-0x0000025B04960000-0x0000025B04970000-memory.dmp

                      • memory/1968-133-0x0000025B04F20000-0x0000025B04F30000-memory.dmp

                      • memory/1968-134-0x0000025B075E0000-0x0000025B075E4000-memory.dmp