Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:34
Static task
static1
Behavioral task
behavioral1
Sample
e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0.dll
Resource
win10v2004-en-20220112
General
-
Target
e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0.dll
-
Size
593KB
-
MD5
c9fb5aed722e2d67c7a04a0a2430ba48
-
SHA1
7279577b33e84c333a225b35dc7f3e2fbe6524b5
-
SHA256
e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0
-
SHA512
993cbeff2ddc0107cb3569d2312bad6ad0bbb081c971f6120714e8189cfa099da3dc4248f14603d2da06f36289a3802a4554a3f4153c0463ad6f6405626154a8
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6d570cc8b703956b
https://mazedecrypt.top/6d570cc8b703956b
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MeasureDebug.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\SkipPing.tiff => C:\Users\Admin\Pictures\SkipPing.tiff.ribK9Og regsvr32.exe File renamed C:\Users\Admin\Pictures\UndoRepair.raw => C:\Users\Admin\Pictures\UndoRepair.raw.hPt7lhx regsvr32.exe File renamed C:\Users\Admin\Pictures\MeasureDebug.tiff => C:\Users\Admin\Pictures\MeasureDebug.tiff.a8Ta regsvr32.exe File renamed C:\Users\Admin\Pictures\SetRegister.raw => C:\Users\Admin\Pictures\SetRegister.raw.ribK9Og regsvr32.exe File opened for modification C:\Users\Admin\Pictures\SkipPing.tiff regsvr32.exe File opened for modification C:\Users\Admin\Pictures\StartUndo.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\StartUndo.tiff => C:\Users\Admin\Pictures\StartUndo.tiff.ribK9Og regsvr32.exe File renamed C:\Users\Admin\Pictures\GrantAssert.crw => C:\Users\Admin\Pictures\GrantAssert.crw.nTEld7 regsvr32.exe File renamed C:\Users\Admin\Pictures\GroupOut.png => C:\Users\Admin\Pictures\GroupOut.png.gcIasQY regsvr32.exe File renamed C:\Users\Admin\Pictures\InitializeSet.raw => C:\Users\Admin\Pictures\InitializeSet.raw.a8Ta regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6d570cc8b703956b.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files\ExpandPop.dotm regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6d570cc8b703956b.tmp regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6d570cc8b703956b.tmp regsvr32.exe File opened for modification C:\Program Files\DismountInvoke.otf regsvr32.exe File opened for modification C:\Program Files\RemoveProtect.vssm regsvr32.exe File opened for modification C:\Program Files\SetPublish.cr2 regsvr32.exe File opened for modification C:\Program Files\SwitchGrant.xlsb regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6d570cc8b703956b.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\6d570cc8b703956b.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\FormatApprove.html regsvr32.exe File opened for modification C:\Program Files\ImportBlock.vdx regsvr32.exe File opened for modification C:\Program Files\InitializeUpdate.tmp regsvr32.exe File opened for modification C:\Program Files\OpenStep.3gp regsvr32.exe File opened for modification C:\Program Files\ResetCheckpoint.wmx regsvr32.exe File opened for modification C:\Program Files\TestInstall.WTV regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6d570cc8b703956b.tmp regsvr32.exe File opened for modification C:\Program Files\BackupEnable.snd regsvr32.exe File opened for modification C:\Program Files\DenyAssert.ttc regsvr32.exe File opened for modification C:\Program Files\ExpandWrite.xltx regsvr32.exe File opened for modification C:\Program Files\HideBackup.aif regsvr32.exe File opened for modification C:\Program Files\RegisterImport.mht regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1332 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 820 vssvc.exe Token: SeRestorePrivilege 820 vssvc.exe Token: SeAuditPrivilege 820 vssvc.exe Token: SeIncreaseQuotaPrivilege 860 wmic.exe Token: SeSecurityPrivilege 860 wmic.exe Token: SeTakeOwnershipPrivilege 860 wmic.exe Token: SeLoadDriverPrivilege 860 wmic.exe Token: SeSystemProfilePrivilege 860 wmic.exe Token: SeSystemtimePrivilege 860 wmic.exe Token: SeProfSingleProcessPrivilege 860 wmic.exe Token: SeIncBasePriorityPrivilege 860 wmic.exe Token: SeCreatePagefilePrivilege 860 wmic.exe Token: SeBackupPrivilege 860 wmic.exe Token: SeRestorePrivilege 860 wmic.exe Token: SeShutdownPrivilege 860 wmic.exe Token: SeDebugPrivilege 860 wmic.exe Token: SeSystemEnvironmentPrivilege 860 wmic.exe Token: SeRemoteShutdownPrivilege 860 wmic.exe Token: SeUndockPrivilege 860 wmic.exe Token: SeManageVolumePrivilege 860 wmic.exe Token: 33 860 wmic.exe Token: 34 860 wmic.exe Token: 35 860 wmic.exe Token: SeIncreaseQuotaPrivilege 860 wmic.exe Token: SeSecurityPrivilege 860 wmic.exe Token: SeTakeOwnershipPrivilege 860 wmic.exe Token: SeLoadDriverPrivilege 860 wmic.exe Token: SeSystemProfilePrivilege 860 wmic.exe Token: SeSystemtimePrivilege 860 wmic.exe Token: SeProfSingleProcessPrivilege 860 wmic.exe Token: SeIncBasePriorityPrivilege 860 wmic.exe Token: SeCreatePagefilePrivilege 860 wmic.exe Token: SeBackupPrivilege 860 wmic.exe Token: SeRestorePrivilege 860 wmic.exe Token: SeShutdownPrivilege 860 wmic.exe Token: SeDebugPrivilege 860 wmic.exe Token: SeSystemEnvironmentPrivilege 860 wmic.exe Token: SeRemoteShutdownPrivilege 860 wmic.exe Token: SeUndockPrivilege 860 wmic.exe Token: SeManageVolumePrivilege 860 wmic.exe Token: 33 860 wmic.exe Token: 34 860 wmic.exe Token: 35 860 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1608 wrote to memory of 1332 1608 regsvr32.exe 27 PID 1332 wrote to memory of 860 1332 regsvr32.exe 32 PID 1332 wrote to memory of 860 1332 regsvr32.exe 32 PID 1332 wrote to memory of 860 1332 regsvr32.exe 32 PID 1332 wrote to memory of 860 1332 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e9d2bc32a003fb158e9774cb25f1b6ff81aca9e9b2651eef80753fd64a8233f0.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\wbem\wmic.exe"C:\w\dtcsj\..\..\Windows\bxit\kyapf\a\..\..\..\system32\lgy\p\..\..\wbem\qdb\ldn\qjdvv\..\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:932