Analysis
-
max time kernel
173s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 23:10
Static task
static1
Behavioral task
behavioral1
Sample
153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe
Resource
win10v2004-en-20220113
General
-
Target
153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe
-
Size
508KB
-
MD5
5df79164b6d0661277f11691121b1d53
-
SHA1
93d9565b2b40ae9e342a4e7e506e9a5694771868
-
SHA256
153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57
-
SHA512
6ac19e9891d2a3abb80d3c11fda6c5299a873f2e42c28866cca72a6a4d9d80ab099a6cd992085ced47c1e407255ecd30f97ebecb8b07b22051465229c48c43aa
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8802099c6e0bfe8a
https://mazedecrypt.top/8802099c6e0bfe8a
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rr91c2xjt.tmp 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\rr91c2xjt.tmp 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 42 IoCs
description ioc Process File opened for modification C:\Program Files\ConvertMount.scf 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\FindRename.dxf 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\MoveMerge.mp2v 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\SubmitGroup.M2TS 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\BackupUpdate.rar 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\CompressClear.jtx 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ConfirmResize.vdw 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\HideCompare.dib 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ShowConfirm.reg 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\AssertLock.txt 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ClearTest.ram 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ConfirmReceive.vsdx 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ExpandSearch.mpa 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\GroupSplit.mpeg2 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\OutUpdate.xsl 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\PingUnprotect.vb 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\RevokeSet.docx 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\CompleteCopy.vst 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\CompleteUnpublish.TTS 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ShowSwitch.jpg 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ConvertFromClose.png 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ConvertGet.vbe 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\RegisterUndo.css 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ResumeCopy.cfg 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\UnpublishSet.html 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\AssertConfirm.7z 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ConnectSelect.m3u 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\GroupJoin.MOD 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\StopInstall.fon 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\LockRemove.tiff 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\PingHide.gif 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\SetUndo.au 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\UnprotectRevoke.vbs 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File created C:\Program Files\DECRYPT-FILES.txt 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\AddAssert.i64 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ShowPop.xml 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\ShowStart.gif 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\UnblockPop.wmf 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files (x86)\rr91c2xjt.tmp 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\OpenPublish.ini 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe File opened for modification C:\Program Files\rr91c2xjt.tmp 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe 3972 153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeShutdownPrivilege 4684 svchost.exe Token: SeCreatePagefilePrivilege 4684 svchost.exe Token: SeShutdownPrivilege 4684 svchost.exe Token: SeCreatePagefilePrivilege 4684 svchost.exe Token: SeShutdownPrivilege 4684 svchost.exe Token: SeCreatePagefilePrivilege 4684 svchost.exe Token: SeBackupPrivilege 3180 vssvc.exe Token: SeRestorePrivilege 3180 vssvc.exe Token: SeAuditPrivilege 3180 vssvc.exe Token: SeSecurityPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeSecurityPrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeSecurityPrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeSecurityPrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeSecurityPrivilege 4880 TiWorker.exe Token: SeBackupPrivilege 4880 TiWorker.exe Token: SeRestorePrivilege 4880 TiWorker.exe Token: SeSecurityPrivilege 4880 TiWorker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe"C:\Users\Admin\AppData\Local\Temp\153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4880