Analysis
-
max time kernel
181s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
16-02-2022 22:42
Static task
static1
Behavioral task
behavioral1
Sample
b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe
Resource
win10v2004-en-20220112
General
-
Target
b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe
-
Size
423KB
-
MD5
524ca5feca6bd4ef511ca5c126cf5e73
-
SHA1
aff9e5a6a17e0347f975b454b0dbf230715a46d3
-
SHA256
b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0
-
SHA512
73a8a41e930ac098117a472c37bff7fb541bcaabdcab066956c733b7206bc7e8be1725a7ff508956b3f36a725ffa6d0d14fd0eef5c138e600cf915946e5dac68
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/875c09836ad0eacb
https://mazedecrypt.top/875c09836ad0eacb
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification C:\Program Files\DenyExpand.wav b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\DenyGrant.ps1xml b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\FormatRestore.pub b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\GetMeasure.tif b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\SearchInstall.iso b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\875c09836ad0eacb.tmp b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\LimitResize.vbe b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\CompleteSubmit.asp b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ConfirmStart.DVR-MS b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ConvertTrace.tif b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\LockFormat.aifc b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\PushPop.zip b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ResetMerge.AAC b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\SyncPop.search-ms b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\UnprotectCompare.mpv2 b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ApproveRead.ocx b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\DenyGroup.avi b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\SendOptimize.wma b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File created C:\Program Files\DECRYPT-FILES.txt b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\GroupUnlock.ps1 b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\SetReceive.jpeg b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ClearSwitch.wdp b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\RenameGet.pptx b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\RenameUnregister.ini b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\OpenGrant.css b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\CompleteTest.wav b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\MountExit.ini b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files (x86)\875c09836ad0eacb.tmp b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\CompleteEnable.vsw b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\ExitRepair.mpe b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\PingOut.rar b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\RequestSkip.png b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\SelectEdit.ex_ b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe File opened for modification C:\Program Files\CompareTrace.rle b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1300 b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe 1300 b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1808 vssvc.exe Token: SeRestorePrivilege 1808 vssvc.exe Token: SeAuditPrivilege 1808 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe"C:\Users\Admin\AppData\Local\Temp\b62c47fe08cdb67d2a9754ea95ce87aeb7bfb6a7fd0ae10e919494d4bbd234a0.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:384
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1808