Analysis
-
max time kernel
164s -
max time network
174s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:50
Static task
static1
Behavioral task
behavioral1
Sample
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
Resource
win10v2004-en-20220113
General
-
Target
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
-
Size
747KB
-
MD5
87239ce48fc8196a5ab66d8562f48f26
-
SHA1
56ae990e9e55c3c842dc10d86815f3913bb408d3
-
SHA256
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8
-
SHA512
9b5a6a9d05ec673eccae33e20472bc74553aef7085cc74c984c051bdb165996ce7744de68bb122f28cfb88707d08b41fcb07681ff4ef329bf6d1e051991aeb45
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099ccaacf1fd
https://mazedecrypt.top/892e099ccaacf1fd
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ShowGrant.tiff => C:\Users\Admin\Pictures\ShowGrant.tiff.ThCDs 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\Pictures\StopSet.tiff 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\StopSet.tiff => C:\Users\Admin\Pictures\StopSet.tiff.ThCDs 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\PushUnregister.raw => C:\Users\Admin\Pictures\PushUnregister.raw.ThCDs 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\Pictures\ShowGrant.tiff 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\UnblockExit.tif => C:\Users\Admin\Pictures\UnblockExit.tif.xy2wa 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\Pictures\UpdateGet.tiff 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\UpdateGet.tiff => C:\Users\Admin\Pictures\UpdateGet.tiff.xy2wa 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\ExpandGet.png => C:\Users\Admin\Pictures\ExpandGet.png.W6ETbKY 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\MountGrant.raw => C:\Users\Admin\Pictures\MountGrant.raw.ljO4 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Drops file in Program Files directory 47 IoCs
description ioc Process File opened for modification C:\Program Files\RequestPublish.gif 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ResolveRequest.ods 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\UnlockBlock.easmx 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\DisconnectRemove.xsl 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\NewBlock.xml 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RedoSplit.TTS 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\AddInitialize.mpeg3 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ClosePush.M2TS 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\GroupResume.js 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\StepRestore.odt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\WatchDeny.cmd 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\GetEnable.mpp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\PingPush.svgz 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ResetUninstall.ttc 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RestoreWait.cab 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\StartDisconnect.7z 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\EditSwitch.ttf 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SubmitTest.mpg 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RevokeDebug.rtf 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\UnlockClear.wps 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CompleteCheckpoint.pptm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\FormatExpand.xps 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\PopOut.vssm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RemoveInitialize.ppt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ResetDebug.ex_ 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CheckpointSubmit.docx 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CompareStep.ps1 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files (x86)\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ConvertEdit.jfif 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CopyConfirm.mov 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\InstallShow.htm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\InvokeUpdate.dotx 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\MountNew.mpg 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099ccaacf1fd.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ConvertToNew.TS 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ConvertToSync.pptm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ImportGet.ps1 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ResetRevoke.asf 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\UnprotectExit.reg 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1880 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1652 vssvc.exe Token: SeRestorePrivilege 1652 vssvc.exe Token: SeAuditPrivilege 1652 vssvc.exe Token: SeIncreaseQuotaPrivilege 584 wmic.exe Token: SeSecurityPrivilege 584 wmic.exe Token: SeTakeOwnershipPrivilege 584 wmic.exe Token: SeLoadDriverPrivilege 584 wmic.exe Token: SeSystemProfilePrivilege 584 wmic.exe Token: SeSystemtimePrivilege 584 wmic.exe Token: SeProfSingleProcessPrivilege 584 wmic.exe Token: SeIncBasePriorityPrivilege 584 wmic.exe Token: SeCreatePagefilePrivilege 584 wmic.exe Token: SeBackupPrivilege 584 wmic.exe Token: SeRestorePrivilege 584 wmic.exe Token: SeShutdownPrivilege 584 wmic.exe Token: SeDebugPrivilege 584 wmic.exe Token: SeSystemEnvironmentPrivilege 584 wmic.exe Token: SeRemoteShutdownPrivilege 584 wmic.exe Token: SeUndockPrivilege 584 wmic.exe Token: SeManageVolumePrivilege 584 wmic.exe Token: 33 584 wmic.exe Token: 34 584 wmic.exe Token: 35 584 wmic.exe Token: SeIncreaseQuotaPrivilege 584 wmic.exe Token: SeSecurityPrivilege 584 wmic.exe Token: SeTakeOwnershipPrivilege 584 wmic.exe Token: SeLoadDriverPrivilege 584 wmic.exe Token: SeSystemProfilePrivilege 584 wmic.exe Token: SeSystemtimePrivilege 584 wmic.exe Token: SeProfSingleProcessPrivilege 584 wmic.exe Token: SeIncBasePriorityPrivilege 584 wmic.exe Token: SeCreatePagefilePrivilege 584 wmic.exe Token: SeBackupPrivilege 584 wmic.exe Token: SeRestorePrivilege 584 wmic.exe Token: SeShutdownPrivilege 584 wmic.exe Token: SeDebugPrivilege 584 wmic.exe Token: SeSystemEnvironmentPrivilege 584 wmic.exe Token: SeRemoteShutdownPrivilege 584 wmic.exe Token: SeUndockPrivilege 584 wmic.exe Token: SeManageVolumePrivilege 584 wmic.exe Token: 33 584 wmic.exe Token: 34 584 wmic.exe Token: 35 584 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 584 1880 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe 35 PID 1880 wrote to memory of 584 1880 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe 35 PID 1880 wrote to memory of 584 1880 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe 35 PID 1880 wrote to memory of 584 1880 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe"C:\Users\Admin\AppData\Local\Temp\822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\wbem\wmic.exe"C:\nmhdc\b\uaynr\..\..\..\Windows\ny\..\system32\diuv\..\wbem\hrtk\uaack\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1744