Analysis

  • max time kernel
    163s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-02-2022 22:34

General

  • Target

    e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe

  • Size

    473KB

  • MD5

    210bb726f1139a30bd83a7579e5322ac

  • SHA1

    cf50ae1c02f9f07566324cd23338c42e1327cd86

  • SHA256

    e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d

  • SHA512

    2665a7e4b97335ec6a38399e6fad1e4627e1f169e01868f13d4b6958ed692169e0f1f4d59472de91f7376c812a145c5abb8a4f3a3f371dd623bf39315d803eb0

Malware Config

Extracted

Path

C:\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: [email protected]<br>Reserve e-mail: [email protected]</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">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<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

[email protected]<br>Reserve

[email protected]</b></u>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe
    "C:\Users\Admin\AppData\Local\Temp\e5feb48ba722996c71c55ddc8b4648cdbbc1fc382e9b0bfcae904273e10ef57d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\system32\wbem\wmic.exe
      "C:\wrnpf\s\wqb\..\..\..\Windows\xrt\..\system32\y\lych\oord\..\..\..\wbem\pn\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:700
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3104
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1984
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3104-136-0x0000016B51BA0000-0x0000016B51BB0000-memory.dmp

    Filesize

    64KB

  • memory/3104-137-0x0000016B52360000-0x0000016B52370000-memory.dmp

    Filesize

    64KB

  • memory/3104-138-0x0000016B54F80000-0x0000016B54F84000-memory.dmp

    Filesize

    16KB

  • memory/4864-130-0x0000000002B10000-0x0000000002B69000-memory.dmp

    Filesize

    356KB

  • memory/4864-131-0x0000000002CB0000-0x0000000002D0B000-memory.dmp

    Filesize

    364KB

  • memory/4864-135-0x0000000002CB1000-0x0000000002CE7000-memory.dmp

    Filesize

    216KB