Analysis
-
max time kernel
164s -
max time network
183s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 23:09
Static task
static1
Behavioral task
behavioral1
Sample
195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe
Resource
win10v2004-en-20220113
General
-
Target
195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe
-
Size
727KB
-
MD5
27c5ecbb94b84c315d56673a851b6cf9
-
SHA1
326f4984644aac4370c8237984fd369f1c9db29b
-
SHA256
195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9
-
SHA512
7a811abc5bc380eab6fd3e447e858c382edfba1e5088cb66065df4c393e9cc01b37bbd875b3de173fabc72f6055467e80a6a8a1b7eb8744d1a40b58877d86b32
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c398b21b2
https://mazedecrypt.top/892e099c398b21b2
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InvokeUnblock.tif => C:\Users\Admin\Pictures\InvokeUnblock.tif.PZuS9H 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File renamed C:\Users\Admin\Pictures\RevokeEnter.tif => C:\Users\Admin\Pictures\RevokeEnter.tif.VLB2l1 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File created C:\Program Files\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ClearStep.docm 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ConvertToRead.vsd 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ConvertToTrace.wmf 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\DenyDisconnect.midi 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\InitializeEnable.ttc 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ResolveOpen.wdp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\SyncExit.wma 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\GrantAssert.cmd 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\MergeInitialize.php 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\RemoveStop.mpeg2 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ExitAdd.midi 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\DismountDisable.wax 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\ReceiveEnable.vsdm 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\RedoDebug.xlsx 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\AssertResume.gif 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\DebugUnlock.odp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files\SuspendInvoke.cab 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files (x86)\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099c398b21b2.tmp 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1632 vssvc.exe Token: SeRestorePrivilege 1632 vssvc.exe Token: SeAuditPrivilege 1632 vssvc.exe Token: SeIncreaseQuotaPrivilege 1936 wmic.exe Token: SeSecurityPrivilege 1936 wmic.exe Token: SeTakeOwnershipPrivilege 1936 wmic.exe Token: SeLoadDriverPrivilege 1936 wmic.exe Token: SeSystemProfilePrivilege 1936 wmic.exe Token: SeSystemtimePrivilege 1936 wmic.exe Token: SeProfSingleProcessPrivilege 1936 wmic.exe Token: SeIncBasePriorityPrivilege 1936 wmic.exe Token: SeCreatePagefilePrivilege 1936 wmic.exe Token: SeBackupPrivilege 1936 wmic.exe Token: SeRestorePrivilege 1936 wmic.exe Token: SeShutdownPrivilege 1936 wmic.exe Token: SeDebugPrivilege 1936 wmic.exe Token: SeSystemEnvironmentPrivilege 1936 wmic.exe Token: SeRemoteShutdownPrivilege 1936 wmic.exe Token: SeUndockPrivilege 1936 wmic.exe Token: SeManageVolumePrivilege 1936 wmic.exe Token: 33 1936 wmic.exe Token: 34 1936 wmic.exe Token: 35 1936 wmic.exe Token: SeIncreaseQuotaPrivilege 1936 wmic.exe Token: SeSecurityPrivilege 1936 wmic.exe Token: SeTakeOwnershipPrivilege 1936 wmic.exe Token: SeLoadDriverPrivilege 1936 wmic.exe Token: SeSystemProfilePrivilege 1936 wmic.exe Token: SeSystemtimePrivilege 1936 wmic.exe Token: SeProfSingleProcessPrivilege 1936 wmic.exe Token: SeIncBasePriorityPrivilege 1936 wmic.exe Token: SeCreatePagefilePrivilege 1936 wmic.exe Token: SeBackupPrivilege 1936 wmic.exe Token: SeRestorePrivilege 1936 wmic.exe Token: SeShutdownPrivilege 1936 wmic.exe Token: SeDebugPrivilege 1936 wmic.exe Token: SeSystemEnvironmentPrivilege 1936 wmic.exe Token: SeRemoteShutdownPrivilege 1936 wmic.exe Token: SeUndockPrivilege 1936 wmic.exe Token: SeManageVolumePrivilege 1936 wmic.exe Token: 33 1936 wmic.exe Token: 34 1936 wmic.exe Token: 35 1936 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1936 1096 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe 35 PID 1096 wrote to memory of 1936 1096 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe 35 PID 1096 wrote to memory of 1936 1096 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe 35 PID 1096 wrote to memory of 1936 1096 195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe"C:\Users\Admin\AppData\Local\Temp\195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\wbem\wmic.exe"C:\iaj\..\Windows\smvo\djqsk\wcrw\..\..\..\system32\tcwe\f\gdbs\..\..\..\wbem\d\ol\vca\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1048