Analysis
-
max time kernel
160s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 22:48
Static task
static1
Behavioral task
behavioral1
Sample
91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe
Resource
win10v2004-en-20220113
General
-
Target
91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe
-
Size
364KB
-
MD5
545bd3bec00aaa561c63c1dbc666d1ed
-
SHA1
b97ef6dac862b082cb9ddd31c08d028f7cc9f54f
-
SHA256
91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1
-
SHA512
d6c86f53b7f65eb84afae5dcc509563dff0d68376f0cded1a6794e40180539244cf9a49a5c07e29372bf5dab0c988b63620490187605dc3d83757bbdb71e93c8
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c2b0cc8943e9c33
https://mazedecrypt.top/6c2b0cc8943e9c33
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConvertFromRevoke.tiff => C:\Users\Admin\Pictures\ConvertFromRevoke.tiff.ew9ozRt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\SuspendSelect.tif => C:\Users\Admin\Pictures\SuspendSelect.tif.TCHXC 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\CompleteExport.raw => C:\Users\Admin\Pictures\CompleteExport.raw.da3ZxT 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Users\Admin\Pictures\ConvertFromRevoke.tiff 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\RemoveConfirm.raw => C:\Users\Admin\Pictures\RemoveConfirm.raw.gRs2Faa 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Users\Admin\Pictures\RevokeStop.tiff 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\RevokeStop.tiff => C:\Users\Admin\Pictures\RevokeStop.tiff.WE3u8vC 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\SubmitExport.tif => C:\Users\Admin\Pictures\SubmitExport.tif.kB9Y 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\CompareReceive.crw => C:\Users\Admin\Pictures\CompareReceive.crw.0KsTwB 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\CompleteClose.tif => C:\Users\Admin\Pictures\CompleteClose.tif.da3ZxT 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\SyncUpdate.tif => C:\Users\Admin\Pictures\SyncUpdate.tif.TCHXC 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Users\Admin\Pictures\SuspendMeasure.tiff 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File renamed C:\Users\Admin\Pictures\SuspendMeasure.tiff => C:\Users\Admin\Pictures\SuspendMeasure.tiff.kB9Y 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2b0cc8943e9c33.tmp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c2b0cc8943e9c33.tmp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\BackupSubmit.emz 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\EnterRequest.aiff 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ExitMerge.jpe 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ProtectPop.TTS 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SaveMerge.wdp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\TraceReset.emf 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File created C:\Program Files\DECRYPT-FILES.txt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\GroupFormat.clr 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SaveWrite.3gp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SelectClose.csv 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SyncRead.rmi 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\WatchTrace.xla 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files (x86)\6c2b0cc8943e9c33.tmp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\EnableConnect.mpe 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ResumeFormat.zip 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SetUnpublish.ADTS 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\CompleteSelect.svg 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ConfirmDismount.eps 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\GrantCompare.mpv2 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\RevokeOptimize.potm 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SetConvert.7z 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\TestSave.mp2v 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\UninstallUndo.vssm 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\WatchReset.mpg 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\AssertClose.mp3 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\NewRepair.txt 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\UnpublishStop.vsdm 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\CompressImport.wax 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\EnableAdd.css 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ExitCopy.dib 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\GetImport.mpp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\NewResume.docx 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\PublishUnprotect.aif 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\CheckpointTest.ADT 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\ResolveResume.wma 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\SwitchDisable.shtml 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\6c2b0cc8943e9c33.tmp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\FindDebug.tmp 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\MergeWatch.WTV 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\OpenHide.ogg 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\OutShow.001 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe File opened for modification C:\Program Files\EnterRegister.mpa 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4476 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe 4476 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeIncreaseQuotaPrivilege 1408 wmic.exe Token: SeSecurityPrivilege 1408 wmic.exe Token: SeTakeOwnershipPrivilege 1408 wmic.exe Token: SeLoadDriverPrivilege 1408 wmic.exe Token: SeSystemProfilePrivilege 1408 wmic.exe Token: SeSystemtimePrivilege 1408 wmic.exe Token: SeProfSingleProcessPrivilege 1408 wmic.exe Token: SeIncBasePriorityPrivilege 1408 wmic.exe Token: SeCreatePagefilePrivilege 1408 wmic.exe Token: SeBackupPrivilege 1408 wmic.exe Token: SeRestorePrivilege 1408 wmic.exe Token: SeShutdownPrivilege 1408 wmic.exe Token: SeDebugPrivilege 1408 wmic.exe Token: SeSystemEnvironmentPrivilege 1408 wmic.exe Token: SeRemoteShutdownPrivilege 1408 wmic.exe Token: SeUndockPrivilege 1408 wmic.exe Token: SeManageVolumePrivilege 1408 wmic.exe Token: 33 1408 wmic.exe Token: 34 1408 wmic.exe Token: 35 1408 wmic.exe Token: 36 1408 wmic.exe Token: SeIncreaseQuotaPrivilege 1408 wmic.exe Token: SeSecurityPrivilege 1408 wmic.exe Token: SeTakeOwnershipPrivilege 1408 wmic.exe Token: SeLoadDriverPrivilege 1408 wmic.exe Token: SeSystemProfilePrivilege 1408 wmic.exe Token: SeSystemtimePrivilege 1408 wmic.exe Token: SeProfSingleProcessPrivilege 1408 wmic.exe Token: SeIncBasePriorityPrivilege 1408 wmic.exe Token: SeCreatePagefilePrivilege 1408 wmic.exe Token: SeBackupPrivilege 1408 wmic.exe Token: SeRestorePrivilege 1408 wmic.exe Token: SeShutdownPrivilege 1408 wmic.exe Token: SeDebugPrivilege 1408 wmic.exe Token: SeSystemEnvironmentPrivilege 1408 wmic.exe Token: SeRemoteShutdownPrivilege 1408 wmic.exe Token: SeUndockPrivilege 1408 wmic.exe Token: SeManageVolumePrivilege 1408 wmic.exe Token: 33 1408 wmic.exe Token: 34 1408 wmic.exe Token: 35 1408 wmic.exe Token: 36 1408 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4476 wrote to memory of 1408 4476 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe 92 PID 4476 wrote to memory of 1408 4476 91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe"C:\Users\Admin\AppData\Local\Temp\91424ac700abaf7d7a690bdeaba2f670c8383f11f15b2b412a52ec4260a12dc1.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\wbem\wmic.exe"C:\ru\..\Windows\yv\f\..\..\system32\o\qh\o\..\..\..\wbem\cm\deops\rlk\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160