Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
16/02/2022, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll
Resource
win10v2004-en-20220112
General
-
Target
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll
-
Size
594KB
-
MD5
775bff988c806a1334f2c1b40e861a9b
-
SHA1
6a223a2870f2b5540b63c61af2f6a186d3160677
-
SHA256
bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d
-
SHA512
3dd7a95306ed9bc74a2062785fd684176fc044a5a52fc322e46459ee9ab05f80d21d2deb4f166b48a3024b053472a637d763016a2ec344750d84cb582e2f96fe
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b850caf412fdfad
https://mazedecrypt.top/6b850caf412fdfad
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Drops file in Program Files directory 40 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\6b850caf412fdfad.tmp regsvr32.exe File opened for modification C:\Program Files\ConvertFromClose.vdx regsvr32.exe File opened for modification C:\Program Files\DenyInvoke.TTS regsvr32.exe File opened for modification C:\Program Files\ExpandUndo.wma regsvr32.exe File opened for modification C:\Program Files\RemoveReceive.ocx regsvr32.exe File opened for modification C:\Program Files\ResolveReset.js regsvr32.exe File opened for modification C:\Program Files\SendCheckpoint.avi regsvr32.exe File opened for modification C:\Program Files\SubmitRepair.TTS regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\ResetRestart.au3 regsvr32.exe File opened for modification C:\Program Files\ResizeSelect.vssx regsvr32.exe File opened for modification C:\Program Files\UnblockFind.3gpp regsvr32.exe File opened for modification C:\Program Files\BlockSuspend.svg regsvr32.exe File opened for modification C:\Program Files\HideUnpublish.htm regsvr32.exe File opened for modification C:\Program Files\MeasureClose.reg regsvr32.exe File opened for modification C:\Program Files\NewDisconnect.mp2v regsvr32.exe File opened for modification C:\Program Files\ConvertSwitch.DVR-MS regsvr32.exe File opened for modification C:\Program Files\JoinPop.temp regsvr32.exe File opened for modification C:\Program Files\SendCheckpoint.lock regsvr32.exe File opened for modification C:\Program Files\CloseConfirm.bin regsvr32.exe File opened for modification C:\Program Files\ConvertToOut.ini regsvr32.exe File opened for modification C:\Program Files\ResetReceive.cab regsvr32.exe File opened for modification C:\Program Files\WriteSearch.vbe regsvr32.exe File opened for modification C:\Program Files\ApproveConfirm.xlsm regsvr32.exe File opened for modification C:\Program Files\InitializeConvert.contact regsvr32.exe File opened for modification C:\Program Files\ResolveRead.aifc regsvr32.exe File opened for modification C:\Program Files\RevokeEdit.rm regsvr32.exe File opened for modification C:\Program Files\StepShow.lock regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6b850caf412fdfad.tmp regsvr32.exe File opened for modification C:\Program Files\ConvertToWait.wmv regsvr32.exe File opened for modification C:\Program Files\CopySubmit.kix regsvr32.exe File opened for modification C:\Program Files\DenyMove.xlsb regsvr32.exe File opened for modification C:\Program Files\FormatLimit.mp2 regsvr32.exe File opened for modification C:\Program Files\ImportSave.mid regsvr32.exe File opened for modification C:\Program Files\StopOptimize.html regsvr32.exe File opened for modification C:\Program Files\GetConvertFrom.docm regsvr32.exe File opened for modification C:\Program Files\GetGrant.7z regsvr32.exe File opened for modification C:\Program Files\StepCopy.mht regsvr32.exe File opened for modification C:\Program Files\UpdateBackup.vssm regsvr32.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "4" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "90228624" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132897014618062079" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "4.477887" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "9.999083" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4340" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "1157726" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4168" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3792 regsvr32.exe 3792 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3716 vssvc.exe Token: SeRestorePrivilege 3716 vssvc.exe Token: SeAuditPrivilege 3716 vssvc.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe Token: SeRestorePrivilege 3308 TiWorker.exe Token: SeSecurityPrivilege 3308 TiWorker.exe Token: SeBackupPrivilege 3308 TiWorker.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3792 2068 regsvr32.exe 59 PID 2068 wrote to memory of 3792 2068 regsvr32.exe 59 PID 2068 wrote to memory of 3792 2068 regsvr32.exe 59
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\bedebbe588a683a1c2eb09d4fa24d1c1ec53ae2715de3656bb96b31aa4f4d85d.dll2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3284
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3716