Analysis
-
max time kernel
162s -
max time network
181s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:34
Static task
static1
Behavioral task
behavioral1
Sample
e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe
Resource
win10v2004-en-20220113
General
-
Target
e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe
-
Size
473KB
-
MD5
210bb726f1139a30bd83a7579e5322ac
-
SHA1
cf50ae1c02f9f07566324cd23338c42e1327cd86
-
SHA256
e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d
-
SHA512
2665a7e4b97335ec6a38399e6fad1e4627e1f169e01868f13d4b6958ed692169e0f1f4d59472de91f7376c812a145c5abb8a4f3a3f371dd623bf39315d803eb0
Malware Config
Extracted
C:\DECRYPT-FILES.html
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompareGet.raw => C:\Users\Admin\Pictures\CompareGet.raw.iAUS e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\DisconnectRegister.tif => C:\Users\Admin\Pictures\DisconnectRegister.tif.iAUS e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\GrantSkip.tif => C:\Users\Admin\Pictures\GrantSkip.tif.iAUS e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\SuspendPublish.raw => C:\Users\Admin\Pictures\SuspendPublish.raw.a5zZv e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\UnprotectComplete.tif => C:\Users\Admin\Pictures\UnprotectComplete.tif.a5zZv e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\WaitPublish.raw => C:\Users\Admin\Pictures\WaitPublish.raw.a5zZv e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\WatchGet.png => C:\Users\Admin\Pictures\WatchGet.png.v4q9J8 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File renamed C:\Users\Admin\Pictures\WriteRepair.tif => C:\Users\Admin\Pictures\WriteRepair.tif.v4q9J8 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.html e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wc1l9b.dat e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\123456789.bmp" e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 576 wmic.exe Token: SeSecurityPrivilege 576 wmic.exe Token: SeTakeOwnershipPrivilege 576 wmic.exe Token: SeLoadDriverPrivilege 576 wmic.exe Token: SeSystemProfilePrivilege 576 wmic.exe Token: SeSystemtimePrivilege 576 wmic.exe Token: SeProfSingleProcessPrivilege 576 wmic.exe Token: SeIncBasePriorityPrivilege 576 wmic.exe Token: SeCreatePagefilePrivilege 576 wmic.exe Token: SeBackupPrivilege 576 wmic.exe Token: SeRestorePrivilege 576 wmic.exe Token: SeShutdownPrivilege 576 wmic.exe Token: SeDebugPrivilege 576 wmic.exe Token: SeSystemEnvironmentPrivilege 576 wmic.exe Token: SeRemoteShutdownPrivilege 576 wmic.exe Token: SeUndockPrivilege 576 wmic.exe Token: SeManageVolumePrivilege 576 wmic.exe Token: 33 576 wmic.exe Token: 34 576 wmic.exe Token: 35 576 wmic.exe Token: SeIncreaseQuotaPrivilege 576 wmic.exe Token: SeSecurityPrivilege 576 wmic.exe Token: SeTakeOwnershipPrivilege 576 wmic.exe Token: SeLoadDriverPrivilege 576 wmic.exe Token: SeSystemProfilePrivilege 576 wmic.exe Token: SeSystemtimePrivilege 576 wmic.exe Token: SeProfSingleProcessPrivilege 576 wmic.exe Token: SeIncBasePriorityPrivilege 576 wmic.exe Token: SeCreatePagefilePrivilege 576 wmic.exe Token: SeBackupPrivilege 576 wmic.exe Token: SeRestorePrivilege 576 wmic.exe Token: SeShutdownPrivilege 576 wmic.exe Token: SeDebugPrivilege 576 wmic.exe Token: SeSystemEnvironmentPrivilege 576 wmic.exe Token: SeRemoteShutdownPrivilege 576 wmic.exe Token: SeUndockPrivilege 576 wmic.exe Token: SeManageVolumePrivilege 576 wmic.exe Token: 33 576 wmic.exe Token: 34 576 wmic.exe Token: 35 576 wmic.exe Token: SeBackupPrivilege 1528 vssvc.exe Token: SeRestorePrivilege 1528 vssvc.exe Token: SeAuditPrivilege 1528 vssvc.exe Token: SeIncreaseQuotaPrivilege 584 wmic.exe Token: SeSecurityPrivilege 584 wmic.exe Token: SeTakeOwnershipPrivilege 584 wmic.exe Token: SeLoadDriverPrivilege 584 wmic.exe Token: SeSystemProfilePrivilege 584 wmic.exe Token: SeSystemtimePrivilege 584 wmic.exe Token: SeProfSingleProcessPrivilege 584 wmic.exe Token: SeIncBasePriorityPrivilege 584 wmic.exe Token: SeCreatePagefilePrivilege 584 wmic.exe Token: SeBackupPrivilege 584 wmic.exe Token: SeRestorePrivilege 584 wmic.exe Token: SeShutdownPrivilege 584 wmic.exe Token: SeDebugPrivilege 584 wmic.exe Token: SeSystemEnvironmentPrivilege 584 wmic.exe Token: SeRemoteShutdownPrivilege 584 wmic.exe Token: SeUndockPrivilege 584 wmic.exe Token: SeManageVolumePrivilege 584 wmic.exe Token: 33 584 wmic.exe Token: 34 584 wmic.exe Token: 35 584 wmic.exe Token: SeIncreaseQuotaPrivilege 584 wmic.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1128 wrote to memory of 576 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 27 PID 1128 wrote to memory of 576 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 27 PID 1128 wrote to memory of 576 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 27 PID 1128 wrote to memory of 576 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 27 PID 1128 wrote to memory of 584 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 37 PID 1128 wrote to memory of 584 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 37 PID 1128 wrote to memory of 584 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 37 PID 1128 wrote to memory of 584 1128 e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe"C:\Users\Admin\AppData\Local\Temp\e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\wbem\wmic.exe"C:\m\cbbu\ypgbq\..\..\..\Windows\c\otn\dpnqb\..\..\..\system32\spw\uy\..\..\wbem\wvgdr\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\system32\wbem\wmic.exe"C:\mrk\..\Windows\kwvrq\i\..\..\system32\sabx\js\x\..\..\..\wbem\qqcwl\ju\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1792