Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:46
Static task
static1
Behavioral task
behavioral1
Sample
9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe
Resource
win10v2004-en-20220113
General
-
Target
9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe
-
Size
916KB
-
MD5
3bfcba2dd05e1c75f86c008f4d245f62
-
SHA1
fa37b947772eb8997a751f18fad9c1ca7f7f1151
-
SHA256
9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c
-
SHA512
4fc4bcc05bee7c60c2385c8ad28acd0387f39ca89979e83f17e76043501a07f02dae1d517d16a5f79a6b880ff85a462950acc0aebdca9028cf57be7ed229d6b5
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c2515824c
https://mazedecrypt.top/892e099c2515824c
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\StopInvoke.png => C:\Users\Admin\Pictures\StopInvoke.png.NyLei 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File renamed C:\Users\Admin\Pictures\CompleteResolve.crw => C:\Users\Admin\Pictures\CompleteResolve.crw.PzLH 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File renamed C:\Users\Admin\Pictures\ProtectConfirm.png => C:\Users\Admin\Pictures\ProtectConfirm.png.DDwBN 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File renamed C:\Users\Admin\Pictures\RegisterUninstall.png => C:\Users\Admin\Pictures\RegisterUninstall.png.DDwBN 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Users\Admin\Pictures\RenameRestart.tiff 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File renamed C:\Users\Admin\Pictures\RenameRestart.tiff => C:\Users\Admin\Pictures\RenameRestart.tiff.NyLei 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File renamed C:\Users\Admin\Pictures\RenameStep.png => C:\Users\Admin\Pictures\RenameStep.png.NyLei 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files\ExpandResolve.au 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\FindHide.rtf 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\InitializeSubmit.tif 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\RestartMount.ps1xml 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\WatchRepair.mov 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\ExpandExport.jpeg 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\SplitSkip.wav 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\SyncWait.jfif 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\MountBackup.vstx 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\UnprotectConvertTo.htm 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files (x86)\4lwyc7o.tmp 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\ConfirmUnprotect.xltx 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\FindLock.vdx 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\StopBackup.htm 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\StopOpen.dwfx 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\SwitchUnpublish.edrwx 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File created C:\Program Files\DECRYPT-FILES.txt 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe File opened for modification C:\Program Files\ResumeEnable.html 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1692 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 280 vssvc.exe Token: SeRestorePrivilege 280 vssvc.exe Token: SeAuditPrivilege 280 vssvc.exe Token: SeIncreaseQuotaPrivilege 880 wmic.exe Token: SeSecurityPrivilege 880 wmic.exe Token: SeTakeOwnershipPrivilege 880 wmic.exe Token: SeLoadDriverPrivilege 880 wmic.exe Token: SeSystemProfilePrivilege 880 wmic.exe Token: SeSystemtimePrivilege 880 wmic.exe Token: SeProfSingleProcessPrivilege 880 wmic.exe Token: SeIncBasePriorityPrivilege 880 wmic.exe Token: SeCreatePagefilePrivilege 880 wmic.exe Token: SeBackupPrivilege 880 wmic.exe Token: SeRestorePrivilege 880 wmic.exe Token: SeShutdownPrivilege 880 wmic.exe Token: SeDebugPrivilege 880 wmic.exe Token: SeSystemEnvironmentPrivilege 880 wmic.exe Token: SeRemoteShutdownPrivilege 880 wmic.exe Token: SeUndockPrivilege 880 wmic.exe Token: SeManageVolumePrivilege 880 wmic.exe Token: 33 880 wmic.exe Token: 34 880 wmic.exe Token: 35 880 wmic.exe Token: SeIncreaseQuotaPrivilege 880 wmic.exe Token: SeSecurityPrivilege 880 wmic.exe Token: SeTakeOwnershipPrivilege 880 wmic.exe Token: SeLoadDriverPrivilege 880 wmic.exe Token: SeSystemProfilePrivilege 880 wmic.exe Token: SeSystemtimePrivilege 880 wmic.exe Token: SeProfSingleProcessPrivilege 880 wmic.exe Token: SeIncBasePriorityPrivilege 880 wmic.exe Token: SeCreatePagefilePrivilege 880 wmic.exe Token: SeBackupPrivilege 880 wmic.exe Token: SeRestorePrivilege 880 wmic.exe Token: SeShutdownPrivilege 880 wmic.exe Token: SeDebugPrivilege 880 wmic.exe Token: SeSystemEnvironmentPrivilege 880 wmic.exe Token: SeRemoteShutdownPrivilege 880 wmic.exe Token: SeUndockPrivilege 880 wmic.exe Token: SeManageVolumePrivilege 880 wmic.exe Token: 33 880 wmic.exe Token: 34 880 wmic.exe Token: 35 880 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 880 1692 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe 35 PID 1692 wrote to memory of 880 1692 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe 35 PID 1692 wrote to memory of 880 1692 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe 35 PID 1692 wrote to memory of 880 1692 9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe"C:\Users\Admin\AppData\Local\Temp\9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\wbem\wmic.exe"C:\oc\..\Windows\sxadf\..\system32\dbjar\gdm\..\..\wbem\i\r\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:280