Analysis
-
max time kernel
164s -
max time network
178s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:40
Static task
static1
Behavioral task
behavioral1
Sample
c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe
Resource
win10v2004-en-20220112
General
-
Target
c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe
-
Size
789KB
-
MD5
a0c5b4adbcd9eb6de9d32537b16c423b
-
SHA1
a243d4611bf442295ab2317d35158503d10e6dad
-
SHA256
c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc
-
SHA512
99c4858a99efdb7df1f5e3081423520b14d5c40d4107c3041b2753bc93b7e94ffd33581068949560484b66305ec49e4a3dd491400a13aad39023aa28c967de52
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c9ff77a70
https://mazedecrypt.top/892e099c9ff77a70
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InitializeSet.raw => C:\Users\Admin\Pictures\InitializeSet.raw.1FX59N c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\MeasureDebug.tiff => C:\Users\Admin\Pictures\MeasureDebug.tiff.eyWak0 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\SetRegister.raw => C:\Users\Admin\Pictures\SetRegister.raw.PmXkAHh c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\SkipPing.tiff => C:\Users\Admin\Pictures\SkipPing.tiff.PmXkAHh c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\StartUndo.tiff => C:\Users\Admin\Pictures\StartUndo.tiff.PmXkAHh c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\UndoRepair.raw => C:\Users\Admin\Pictures\UndoRepair.raw.PmXkAHh c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\GrantAssert.crw => C:\Users\Admin\Pictures\GrantAssert.crw.FarHG c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File renamed C:\Users\Admin\Pictures\GroupOut.png => C:\Users\Admin\Pictures\GroupOut.png.FarHG c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Users\Admin\Pictures\MeasureDebug.tiff c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Users\Admin\Pictures\SkipPing.tiff c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Users\Admin\Pictures\StartUndo.tiff c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\DenyAssert.ttc c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\ImportBlock.vdx c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\InitializeUpdate.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\OpenStep.3gp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\RemoveProtect.vssm c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File created C:\Program Files\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\BackupEnable.snd c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\DismountInvoke.otf c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\RegisterImport.mht c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\SetPublish.cr2 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\ExpandPop.dotm c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\ExpandWrite.xltx c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\FormatApprove.html c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\HideBackup.aif c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\SwitchGrant.xlsb c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\TestInstall.WTV c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files\ResetCheckpoint.wmx c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File opened for modification C:\Program Files (x86)\892e099c9ff77a70.tmp c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1040 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1524 vssvc.exe Token: SeRestorePrivilege 1524 vssvc.exe Token: SeAuditPrivilege 1524 vssvc.exe Token: SeIncreaseQuotaPrivilege 1512 wmic.exe Token: SeSecurityPrivilege 1512 wmic.exe Token: SeTakeOwnershipPrivilege 1512 wmic.exe Token: SeLoadDriverPrivilege 1512 wmic.exe Token: SeSystemProfilePrivilege 1512 wmic.exe Token: SeSystemtimePrivilege 1512 wmic.exe Token: SeProfSingleProcessPrivilege 1512 wmic.exe Token: SeIncBasePriorityPrivilege 1512 wmic.exe Token: SeCreatePagefilePrivilege 1512 wmic.exe Token: SeBackupPrivilege 1512 wmic.exe Token: SeRestorePrivilege 1512 wmic.exe Token: SeShutdownPrivilege 1512 wmic.exe Token: SeDebugPrivilege 1512 wmic.exe Token: SeSystemEnvironmentPrivilege 1512 wmic.exe Token: SeRemoteShutdownPrivilege 1512 wmic.exe Token: SeUndockPrivilege 1512 wmic.exe Token: SeManageVolumePrivilege 1512 wmic.exe Token: 33 1512 wmic.exe Token: 34 1512 wmic.exe Token: 35 1512 wmic.exe Token: SeIncreaseQuotaPrivilege 1512 wmic.exe Token: SeSecurityPrivilege 1512 wmic.exe Token: SeTakeOwnershipPrivilege 1512 wmic.exe Token: SeLoadDriverPrivilege 1512 wmic.exe Token: SeSystemProfilePrivilege 1512 wmic.exe Token: SeSystemtimePrivilege 1512 wmic.exe Token: SeProfSingleProcessPrivilege 1512 wmic.exe Token: SeIncBasePriorityPrivilege 1512 wmic.exe Token: SeCreatePagefilePrivilege 1512 wmic.exe Token: SeBackupPrivilege 1512 wmic.exe Token: SeRestorePrivilege 1512 wmic.exe Token: SeShutdownPrivilege 1512 wmic.exe Token: SeDebugPrivilege 1512 wmic.exe Token: SeSystemEnvironmentPrivilege 1512 wmic.exe Token: SeRemoteShutdownPrivilege 1512 wmic.exe Token: SeUndockPrivilege 1512 wmic.exe Token: SeManageVolumePrivilege 1512 wmic.exe Token: 33 1512 wmic.exe Token: 34 1512 wmic.exe Token: 35 1512 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1512 1040 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe 35 PID 1040 wrote to memory of 1512 1040 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe 35 PID 1040 wrote to memory of 1512 1040 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe 35 PID 1040 wrote to memory of 1512 1040 c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe"C:\Users\Admin\AppData\Local\Temp\c040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\wbem\wmic.exe"C:\mqw\g\u\..\..\..\Windows\gpot\p\..\..\system32\mv\jiiw\c\..\..\..\wbem\yrpqw\qeq\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1452