Analysis
-
max time kernel
179s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 22:50
Static task
static1
Behavioral task
behavioral1
Sample
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
Resource
win10v2004-en-20220113
General
-
Target
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe
-
Size
747KB
-
MD5
87239ce48fc8196a5ab66d8562f48f26
-
SHA1
56ae990e9e55c3c842dc10d86815f3913bb408d3
-
SHA256
822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8
-
SHA512
9b5a6a9d05ec673eccae33e20472bc74553aef7085cc74c984c051bdb165996ce7744de68bb122f28cfb88707d08b41fcb07681ff4ef329bf6d1e051991aeb45
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8802099c70cb6511
https://mazedecrypt.top/8802099c70cb6511
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConnectResolve.tiff 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\ConnectResolve.tiff => C:\Users\Admin\Pictures\ConnectResolve.tiff.suXgY2e 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\LockMerge.crw => C:\Users\Admin\Pictures\LockMerge.crw.nPWRMei 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File renamed C:\Users\Admin\Pictures\RepairConvertFrom.crw => C:\Users\Admin\Pictures\RepairConvertFrom.crw.gmIv 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8802099c70cb6511.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\8802099c70cb6511.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 40 IoCs
description ioc Process File opened for modification C:\Program Files\8802099c70cb6511.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CheckpointSkip.nfo 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ImportCopy.wmv 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ImportTest.cab 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\MergeDeny.cab 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\MoveStart.vsdm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\WatchNew.ppsm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CheckpointEnable.zip 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CompressWrite.mp4v 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ConnectWrite.html 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SplitExpand.xlsb 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\StopGroup.cr2 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SuspendMove.xlt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\InvokeShow.mpe 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ProtectExport.vdw 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RepairShow.vst 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RestoreAdd.mpe 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\CompleteGrant.kix 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ImportOptimize.mpa 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ReadDeny.wvx 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files (x86)\8802099c70cb6511.tmp 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\InstallTest.vb 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\JoinStart.aiff 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\LockUnlock.vssm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RequestCompare.WTV 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RevokeGroup.ttc 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\RequestEnter.MTS 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SwitchTest.mpeg2 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\UnlockEdit.aifc 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\DismountUse.svgz 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\EnterBlock.potm 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\GroupGrant.ogg 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\MergeClose.gif 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\OutComplete.csv 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SendPush.mpa 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\ShowSet.cab 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\SubmitCompare.mov 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe File opened for modification C:\Program Files\TestConvertFrom.snd 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe 4920 822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 3816 vssvc.exe Token: SeRestorePrivilege 3816 vssvc.exe Token: SeAuditPrivilege 3816 vssvc.exe Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe Token: SeShutdownPrivilege 2788 svchost.exe Token: SeCreatePagefilePrivilege 2788 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe"C:\Users\Admin\AppData\Local\Temp\822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2788