Analysis
-
max time kernel
160s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:38
Static task
static1
Behavioral task
behavioral1
Sample
cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe
Resource
win10v2004-en-20220113
General
-
Target
cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe
-
Size
378KB
-
MD5
18b994c58c5adace6c60c6f43ac65941
-
SHA1
7cd4d6cd73eaa5b0016dd8dce919fe36b8936d2c
-
SHA256
cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63
-
SHA512
e915073337649a228f4bbe0edfd1884a83e14560a9a344a9cb0e8cd5acdb15ff965de32733d1b06b81f3815280227ea9424bbaa5c9beb9305d62cce95039c024
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c6f57c36f
https://mazedecrypt.top/892e099c6f57c36f
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 1096 proc.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UnblockWatch.tif => C:\Users\Admin\Pictures\UnblockWatch.tif.alGLl proc.exe File renamed C:\Users\Admin\Pictures\GroupDisconnect.crw => C:\Users\Admin\Pictures\GroupDisconnect.crw.xWOx proc.exe File renamed C:\Users\Admin\Pictures\HideSplit.crw => C:\Users\Admin\Pictures\HideSplit.crw.xWOx proc.exe File opened for modification C:\Users\Admin\Pictures\ResumeReceive.tiff proc.exe File renamed C:\Users\Admin\Pictures\ResumeReceive.tiff => C:\Users\Admin\Pictures\ResumeReceive.tiff.alGLl proc.exe File renamed C:\Users\Admin\Pictures\SplitConvertTo.tif => C:\Users\Admin\Pictures\SplitConvertTo.tif.alGLl proc.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt proc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099c6f57c36f.tmp proc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" proc.exe -
Drops file in Program Files directory 42 IoCs
description ioc Process File created C:\Program Files (x86)\DECRYPT-FILES.txt proc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt proc.exe File opened for modification C:\Program Files\CompareSend.pptm proc.exe File opened for modification C:\Program Files\CompleteUpdate.vst proc.exe File opened for modification C:\Program Files\PublishStep.mp3 proc.exe File opened for modification C:\Program Files\SplitOpen.easmx proc.exe File opened for modification C:\Program Files\InvokePop.mhtml proc.exe File opened for modification C:\Program Files\MergeMount.mpeg2 proc.exe File opened for modification C:\Program Files\ClearSuspend.M2V proc.exe File opened for modification C:\Program Files\DenySync.tiff proc.exe File opened for modification C:\Program Files\ExportRename.scf proc.exe File opened for modification C:\Program Files\FormatSet.mpg proc.exe File opened for modification C:\Program Files\BackupRepair.pot proc.exe File opened for modification C:\Program Files\BackupRequest.iso proc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099c6f57c36f.tmp proc.exe File created C:\Program Files\DECRYPT-FILES.txt proc.exe File opened for modification C:\Program Files\ReadBlock.xls proc.exe File opened for modification C:\Program Files\RemoveRestore.wav proc.exe File opened for modification C:\Program Files\SyncStep.vsdx proc.exe File opened for modification C:\Program Files\ResumeSwitch.tmp proc.exe File opened for modification C:\Program Files\SaveSelect.temp proc.exe File opened for modification C:\Program Files\UnregisterStart.tif proc.exe File opened for modification C:\Program Files\UpdateConnect.zip proc.exe File opened for modification C:\Program Files\ApproveUse.png proc.exe File opened for modification C:\Program Files\ConvertToSelect.bmp proc.exe File opened for modification C:\Program Files\LimitConvert.wax proc.exe File opened for modification C:\Program Files\RepairUnpublish.aifc proc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt proc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt proc.exe File opened for modification C:\Program Files\892e099c6f57c36f.tmp proc.exe File opened for modification C:\Program Files\ConfirmPublish.wmx proc.exe File opened for modification C:\Program Files\CopyAdd.tmp proc.exe File opened for modification C:\Program Files\PushRevoke.vbs proc.exe File opened for modification C:\Program Files\SubmitInstall.mp3 proc.exe File opened for modification C:\Program Files (x86)\892e099c6f57c36f.tmp proc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099c6f57c36f.tmp proc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099c6f57c36f.tmp proc.exe File opened for modification C:\Program Files\BlockWait.odt proc.exe File opened for modification C:\Program Files\CloseEnable.ocx proc.exe File opened for modification C:\Program Files\ResumeUnlock.M2V proc.exe File opened for modification C:\Program Files\SearchEdit.ram proc.exe File opened for modification C:\Program Files\SetRevoke.vst proc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 proc.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1468 vssvc.exe Token: SeRestorePrivilege 1468 vssvc.exe Token: SeAuditPrivilege 1468 vssvc.exe Token: SeIncreaseQuotaPrivilege 1696 wmic.exe Token: SeSecurityPrivilege 1696 wmic.exe Token: SeTakeOwnershipPrivilege 1696 wmic.exe Token: SeLoadDriverPrivilege 1696 wmic.exe Token: SeSystemProfilePrivilege 1696 wmic.exe Token: SeSystemtimePrivilege 1696 wmic.exe Token: SeProfSingleProcessPrivilege 1696 wmic.exe Token: SeIncBasePriorityPrivilege 1696 wmic.exe Token: SeCreatePagefilePrivilege 1696 wmic.exe Token: SeBackupPrivilege 1696 wmic.exe Token: SeRestorePrivilege 1696 wmic.exe Token: SeShutdownPrivilege 1696 wmic.exe Token: SeDebugPrivilege 1696 wmic.exe Token: SeSystemEnvironmentPrivilege 1696 wmic.exe Token: SeRemoteShutdownPrivilege 1696 wmic.exe Token: SeUndockPrivilege 1696 wmic.exe Token: SeManageVolumePrivilege 1696 wmic.exe Token: 33 1696 wmic.exe Token: 34 1696 wmic.exe Token: 35 1696 wmic.exe Token: SeIncreaseQuotaPrivilege 1696 wmic.exe Token: SeSecurityPrivilege 1696 wmic.exe Token: SeTakeOwnershipPrivilege 1696 wmic.exe Token: SeLoadDriverPrivilege 1696 wmic.exe Token: SeSystemProfilePrivilege 1696 wmic.exe Token: SeSystemtimePrivilege 1696 wmic.exe Token: SeProfSingleProcessPrivilege 1696 wmic.exe Token: SeIncBasePriorityPrivilege 1696 wmic.exe Token: SeCreatePagefilePrivilege 1696 wmic.exe Token: SeBackupPrivilege 1696 wmic.exe Token: SeRestorePrivilege 1696 wmic.exe Token: SeShutdownPrivilege 1696 wmic.exe Token: SeDebugPrivilege 1696 wmic.exe Token: SeSystemEnvironmentPrivilege 1696 wmic.exe Token: SeRemoteShutdownPrivilege 1696 wmic.exe Token: SeUndockPrivilege 1696 wmic.exe Token: SeManageVolumePrivilege 1696 wmic.exe Token: 33 1696 wmic.exe Token: 34 1696 wmic.exe Token: 35 1696 wmic.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1096 1616 cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe 28 PID 1616 wrote to memory of 1096 1616 cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe 28 PID 1616 wrote to memory of 1096 1616 cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe 28 PID 1616 wrote to memory of 1096 1616 cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe 28 PID 1096 wrote to memory of 1696 1096 proc.exe 35 PID 1096 wrote to memory of 1696 1096 proc.exe 35 PID 1096 wrote to memory of 1696 1096 proc.exe 35 PID 1096 wrote to memory of 1696 1096 proc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe"C:\Users\Admin\AppData\Local\Temp\cf79c908ce12b4717b81beca1a86cc34ffdd3bd56d65bdba841f9fb6cd2d8b63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\proc.exe"proc.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\wbem\wmic.exe"C:\fh\..\Windows\e\..\system32\v\..\wbem\sefp\w\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1584