Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:48
Static task
static1
Behavioral task
behavioral1
Sample
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll
Resource
win10v2004-en-20220113
General
-
Target
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll
-
Size
591KB
-
MD5
140f6f9a6b3fb5c99b61c20afb6f39d7
-
SHA1
bb1136d16e8a203da7ed10426abd8fe475e7af97
-
SHA256
90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05
-
SHA512
51a5bb962600d3574bcd9d1daa274a17950f8bff5365514eddc6f01c39a6b36247a29ab7c7fc84fa2b171c2fdc32f70c8dd28143edbc7172955b95043c9f2573
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6d570cc8e2f48843
https://mazedecrypt.top/6d570cc8e2f48843
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
regsvr32.exedescription ioc Process File renamed C:\Users\Admin\Pictures\NewSuspend.tif => C:\Users\Admin\Pictures\NewSuspend.tif.wKjb2qy regsvr32.exe File renamed C:\Users\Admin\Pictures\ResumeBackup.tif => C:\Users\Admin\Pictures\ResumeBackup.tif.gJ8D regsvr32.exe File renamed C:\Users\Admin\Pictures\SetMerge.crw => C:\Users\Admin\Pictures\SetMerge.crw.gJ8D regsvr32.exe File renamed C:\Users\Admin\Pictures\SyncRestore.tif => C:\Users\Admin\Pictures\SyncRestore.tif.Qpa2 regsvr32.exe File opened for modification C:\Users\Admin\Pictures\ConnectInvoke.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\ConvertFromUse.png => C:\Users\Admin\Pictures\ConvertFromUse.png.a05uMS regsvr32.exe File renamed C:\Users\Admin\Pictures\ExitWait.crw => C:\Users\Admin\Pictures\ExitWait.crw.YnRhPx regsvr32.exe File renamed C:\Users\Admin\Pictures\ExpandConvertTo.png => C:\Users\Admin\Pictures\ExpandConvertTo.png.sbaT3Y regsvr32.exe File renamed C:\Users\Admin\Pictures\TestCopy.crw => C:\Users\Admin\Pictures\TestCopy.crw.Qpa2 regsvr32.exe File renamed C:\Users\Admin\Pictures\CheckpointPush.raw => C:\Users\Admin\Pictures\CheckpointPush.raw.Twf205 regsvr32.exe File renamed C:\Users\Admin\Pictures\ConnectInvoke.tiff => C:\Users\Admin\Pictures\ConnectInvoke.tiff.Twf205 regsvr32.exe -
Drops startup file 2 IoCs
Processes:
regsvr32.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6d570cc8e2f48843.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" regsvr32.exe -
Drops file in Program Files directory 45 IoCs
Processes:
regsvr32.exedescription ioc Process File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\MoveMeasure.css regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6d570cc8e2f48843.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6d570cc8e2f48843.tmp regsvr32.exe File opened for modification C:\Program Files\CheckpointRepair.xml regsvr32.exe File opened for modification C:\Program Files\MoveSend.001 regsvr32.exe File opened for modification C:\Program Files\PopRead.pot regsvr32.exe File opened for modification C:\Program Files\PublishOpen.ppsm regsvr32.exe File opened for modification C:\Program Files\RequestFind.3gpp regsvr32.exe File opened for modification C:\Program Files\ResolveSwitch.ppt regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\FormatRestart.WTV regsvr32.exe File opened for modification C:\Program Files\InitializeSwitch.ttc regsvr32.exe File opened for modification C:\Program Files\MeasureDisable.mpp regsvr32.exe File opened for modification C:\Program Files\MountOpen.xltx regsvr32.exe File opened for modification C:\Program Files\RestartCompare.wax regsvr32.exe File opened for modification C:\Program Files\RestartConvertFrom.raw regsvr32.exe File opened for modification C:\Program Files\6d570cc8e2f48843.tmp regsvr32.exe File opened for modification C:\Program Files\ApproveFormat.vst regsvr32.exe File opened for modification C:\Program Files\DenyExit.emf regsvr32.exe File opened for modification C:\Program Files\ExitSearch.html regsvr32.exe File opened for modification C:\Program Files\ExpandCheckpoint.ods regsvr32.exe File opened for modification C:\Program Files\RevokePublish.potx regsvr32.exe File opened for modification C:\Program Files\InitializeUnregister.wma regsvr32.exe File opened for modification C:\Program Files\LimitEnable.rle regsvr32.exe File opened for modification C:\Program Files\PushSearch.rtf regsvr32.exe File opened for modification C:\Program Files\RequestTrace.jpe regsvr32.exe File opened for modification C:\Program Files\ResumeSend.temp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\AddReset.au regsvr32.exe File opened for modification C:\Program Files\DisableRename.potm regsvr32.exe File opened for modification C:\Program Files\ReceiveConvertFrom.wax regsvr32.exe File opened for modification C:\Program Files (x86)\6d570cc8e2f48843.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6d570cc8e2f48843.tmp regsvr32.exe File opened for modification C:\Program Files\AssertExpand.wma regsvr32.exe File opened for modification C:\Program Files\EnableRequest.wma regsvr32.exe File opened for modification C:\Program Files\HideWrite.bat regsvr32.exe File opened for modification C:\Program Files\LockRedo.pptm regsvr32.exe File opened for modification C:\Program Files\ResolveConvert.docm regsvr32.exe File opened for modification C:\Program Files\TraceSync.search-ms regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\CompleteFormat.tmp regsvr32.exe File opened for modification C:\Program Files\RequestLimit.edrwx regsvr32.exe File opened for modification C:\Program Files\SwitchCompare.tiff regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid Process 1308 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
vssvc.exewmic.exedescription pid Process Token: SeBackupPrivilege 556 vssvc.exe Token: SeRestorePrivilege 556 vssvc.exe Token: SeAuditPrivilege 556 vssvc.exe Token: SeIncreaseQuotaPrivilege 1348 wmic.exe Token: SeSecurityPrivilege 1348 wmic.exe Token: SeTakeOwnershipPrivilege 1348 wmic.exe Token: SeLoadDriverPrivilege 1348 wmic.exe Token: SeSystemProfilePrivilege 1348 wmic.exe Token: SeSystemtimePrivilege 1348 wmic.exe Token: SeProfSingleProcessPrivilege 1348 wmic.exe Token: SeIncBasePriorityPrivilege 1348 wmic.exe Token: SeCreatePagefilePrivilege 1348 wmic.exe Token: SeBackupPrivilege 1348 wmic.exe Token: SeRestorePrivilege 1348 wmic.exe Token: SeShutdownPrivilege 1348 wmic.exe Token: SeDebugPrivilege 1348 wmic.exe Token: SeSystemEnvironmentPrivilege 1348 wmic.exe Token: SeRemoteShutdownPrivilege 1348 wmic.exe Token: SeUndockPrivilege 1348 wmic.exe Token: SeManageVolumePrivilege 1348 wmic.exe Token: 33 1348 wmic.exe Token: 34 1348 wmic.exe Token: 35 1348 wmic.exe Token: SeIncreaseQuotaPrivilege 1348 wmic.exe Token: SeSecurityPrivilege 1348 wmic.exe Token: SeTakeOwnershipPrivilege 1348 wmic.exe Token: SeLoadDriverPrivilege 1348 wmic.exe Token: SeSystemProfilePrivilege 1348 wmic.exe Token: SeSystemtimePrivilege 1348 wmic.exe Token: SeProfSingleProcessPrivilege 1348 wmic.exe Token: SeIncBasePriorityPrivilege 1348 wmic.exe Token: SeCreatePagefilePrivilege 1348 wmic.exe Token: SeBackupPrivilege 1348 wmic.exe Token: SeRestorePrivilege 1348 wmic.exe Token: SeShutdownPrivilege 1348 wmic.exe Token: SeDebugPrivilege 1348 wmic.exe Token: SeSystemEnvironmentPrivilege 1348 wmic.exe Token: SeRemoteShutdownPrivilege 1348 wmic.exe Token: SeUndockPrivilege 1348 wmic.exe Token: SeManageVolumePrivilege 1348 wmic.exe Token: 33 1348 wmic.exe Token: 34 1348 wmic.exe Token: 35 1348 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid Process procid_target PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1576 wrote to memory of 1308 1576 regsvr32.exe 27 PID 1308 wrote to memory of 1348 1308 regsvr32.exe 36 PID 1308 wrote to memory of 1348 1308 regsvr32.exe 36 PID 1308 wrote to memory of 1348 1308 regsvr32.exe 36 PID 1308 wrote to memory of 1348 1308 regsvr32.exe 36
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\90ae5c78af747bb9e46118e6c1bed8228a77a4dc3d2f12d7e254c88b3208db05.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\wbem\wmic.exe"C:\mwg\..\Windows\ufxn\jyeb\..\..\system32\hybot\..\wbem\mp\nhy\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:556
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1664