Analysis
-
max time kernel
153s -
max time network
170s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:35
Static task
static1
Behavioral task
behavioral1
Sample
e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe
Resource
win10v2004-en-20220112
General
-
Target
e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe
-
Size
365KB
-
MD5
99743dd716d53c6b8962e1b9ff1d3a7a
-
SHA1
54a2b49a538ca07bf1b74c1ceab2b580b14d4450
-
SHA256
e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763
-
SHA512
842b0c3d2d15c4cb66cdd360e215676f2d68017ff96c51860879714959a474ace6c4e44ee3a629a1a3d004b88552d02005fd2530c849934a3c10dd076b173a4a
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099cc2a93e2a
https://mazedecrypt.top/892e099cc2a93e2a
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SendComplete.png => C:\Users\Admin\Pictures\SendComplete.png.gOlySZu e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File renamed C:\Users\Admin\Pictures\ConvertFromStop.raw => C:\Users\Admin\Pictures\ConvertFromStop.raw.0jNL9v e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File renamed C:\Users\Admin\Pictures\InitializeProtect.crw => C:\Users\Admin\Pictures\InitializeProtect.crw.shY8lr e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File renamed C:\Users\Admin\Pictures\InstallDisconnect.raw => C:\Users\Admin\Pictures\InstallDisconnect.raw.shY8lr e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File renamed C:\Users\Admin\Pictures\RequestDisable.tif => C:\Users\Admin\Pictures\RequestDisable.tif.shY8lr e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File renamed C:\Users\Admin\Pictures\SearchGrant.tif => C:\Users\Admin\Pictures\SearchGrant.tif.shY8lr e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification C:\Program Files\RequestRestart.001 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\PublishTrace.fon e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\ResolveUnlock.dwg e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\TraceDisconnect.aiff e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\TraceEdit.mpeg2 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files (x86)\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099cc2a93e2a.tmp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\InvokeConnect.vst e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\MountUpdate.kix e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\RedoUndo.asp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\SendJoin.odt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\ClearSwitch.sql e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\ConvertToSuspend.css e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\DebugDeny.ttc e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\OpenExport.3gpp e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File opened for modification C:\Program Files\UnlockWrite.TTS e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe File created C:\Program Files\DECRYPT-FILES.txt e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1624 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 988 vssvc.exe Token: SeRestorePrivilege 988 vssvc.exe Token: SeAuditPrivilege 988 vssvc.exe Token: SeIncreaseQuotaPrivilege 1784 wmic.exe Token: SeSecurityPrivilege 1784 wmic.exe Token: SeTakeOwnershipPrivilege 1784 wmic.exe Token: SeLoadDriverPrivilege 1784 wmic.exe Token: SeSystemProfilePrivilege 1784 wmic.exe Token: SeSystemtimePrivilege 1784 wmic.exe Token: SeProfSingleProcessPrivilege 1784 wmic.exe Token: SeIncBasePriorityPrivilege 1784 wmic.exe Token: SeCreatePagefilePrivilege 1784 wmic.exe Token: SeBackupPrivilege 1784 wmic.exe Token: SeRestorePrivilege 1784 wmic.exe Token: SeShutdownPrivilege 1784 wmic.exe Token: SeDebugPrivilege 1784 wmic.exe Token: SeSystemEnvironmentPrivilege 1784 wmic.exe Token: SeRemoteShutdownPrivilege 1784 wmic.exe Token: SeUndockPrivilege 1784 wmic.exe Token: SeManageVolumePrivilege 1784 wmic.exe Token: 33 1784 wmic.exe Token: 34 1784 wmic.exe Token: 35 1784 wmic.exe Token: SeIncreaseQuotaPrivilege 1784 wmic.exe Token: SeSecurityPrivilege 1784 wmic.exe Token: SeTakeOwnershipPrivilege 1784 wmic.exe Token: SeLoadDriverPrivilege 1784 wmic.exe Token: SeSystemProfilePrivilege 1784 wmic.exe Token: SeSystemtimePrivilege 1784 wmic.exe Token: SeProfSingleProcessPrivilege 1784 wmic.exe Token: SeIncBasePriorityPrivilege 1784 wmic.exe Token: SeCreatePagefilePrivilege 1784 wmic.exe Token: SeBackupPrivilege 1784 wmic.exe Token: SeRestorePrivilege 1784 wmic.exe Token: SeShutdownPrivilege 1784 wmic.exe Token: SeDebugPrivilege 1784 wmic.exe Token: SeSystemEnvironmentPrivilege 1784 wmic.exe Token: SeRemoteShutdownPrivilege 1784 wmic.exe Token: SeUndockPrivilege 1784 wmic.exe Token: SeManageVolumePrivilege 1784 wmic.exe Token: 33 1784 wmic.exe Token: 34 1784 wmic.exe Token: 35 1784 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1784 1624 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe 33 PID 1624 wrote to memory of 1784 1624 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe 33 PID 1624 wrote to memory of 1784 1624 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe 33 PID 1624 wrote to memory of 1784 1624 e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe"C:\Users\Admin\AppData\Local\Temp\e45eacf5158bb2aa11f29f0675b4cb68dbf7e376569516fe33f84be524c67763.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\wbem\wmic.exe"C:\onkt\kgwqy\tyakm\..\..\..\Windows\kuejk\..\system32\f\j\st\..\..\..\wbem\b\sh\qtcmh\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:988
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1752