Analysis
-
max time kernel
163s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:52
Static task
static1
Behavioral task
behavioral1
Sample
79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b.dll
Resource
win10v2004-en-20220112
General
-
Target
79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b.dll
-
Size
593KB
-
MD5
27b6240febd31d1e5673bf756b3d826f
-
SHA1
00762f434a28eb9f452fcbdecd180ada8efafce4
-
SHA256
79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b
-
SHA512
45c58b22b25e394afb4c594551a961443aec7716e9ef61ca735a1650bec6661223fbc18e068453efb7a63831502ba08ea12f3105d8e31e79606b4faafd1963a9
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6d570cc8b6e99330
https://mazedecrypt.top/6d570cc8b6e99330
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RenameStep.png => C:\Users\Admin\Pictures\RenameStep.png.8UW1g regsvr32.exe File renamed C:\Users\Admin\Pictures\StopInvoke.png => C:\Users\Admin\Pictures\StopInvoke.png.8UW1g regsvr32.exe File renamed C:\Users\Admin\Pictures\CompleteResolve.crw => C:\Users\Admin\Pictures\CompleteResolve.crw.35cyiy regsvr32.exe File renamed C:\Users\Admin\Pictures\ProtectConfirm.png => C:\Users\Admin\Pictures\ProtectConfirm.png.iJcE regsvr32.exe File renamed C:\Users\Admin\Pictures\RegisterUninstall.png => C:\Users\Admin\Pictures\RegisterUninstall.png.8UW1g regsvr32.exe File opened for modification C:\Users\Admin\Pictures\RenameRestart.tiff regsvr32.exe File renamed C:\Users\Admin\Pictures\RenameRestart.tiff => C:\Users\Admin\Pictures\RenameRestart.tiff.8UW1g regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6d570cc8b6e99330.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files\RestartMount.ps1xml regsvr32.exe File opened for modification C:\Program Files\SplitSkip.wav regsvr32.exe File opened for modification C:\Program Files\WatchRepair.mov regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6d570cc8b6e99330.tmp regsvr32.exe File opened for modification C:\Program Files\FindHide.rtf regsvr32.exe File opened for modification C:\Program Files\ResumeEnable.html regsvr32.exe File opened for modification C:\Program Files\StopOpen.dwfx regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6d570cc8b6e99330.tmp regsvr32.exe File opened for modification C:\Program Files\ExpandExport.jpeg regsvr32.exe File opened for modification C:\Program Files\InitializeSubmit.tif regsvr32.exe File opened for modification C:\Program Files\MountBackup.vstx regsvr32.exe File opened for modification C:\Program Files\StopBackup.htm regsvr32.exe File opened for modification C:\Program Files\SyncWait.jfif regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6d570cc8b6e99330.tmp regsvr32.exe File opened for modification C:\Program Files\ConfirmUnprotect.xltx regsvr32.exe File opened for modification C:\Program Files\ExpandResolve.au regsvr32.exe File opened for modification C:\Program Files\FindLock.vdx regsvr32.exe File opened for modification C:\Program Files\SwitchUnpublish.edrwx regsvr32.exe File opened for modification C:\Program Files\UnprotectConvertTo.htm regsvr32.exe File opened for modification C:\Program Files (x86)\6d570cc8b6e99330.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6d570cc8b6e99330.tmp regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1468 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 1632 vssvc.exe Token: SeRestorePrivilege 1632 vssvc.exe Token: SeAuditPrivilege 1632 vssvc.exe Token: SeIncreaseQuotaPrivilege 1476 wmic.exe Token: SeSecurityPrivilege 1476 wmic.exe Token: SeTakeOwnershipPrivilege 1476 wmic.exe Token: SeLoadDriverPrivilege 1476 wmic.exe Token: SeSystemProfilePrivilege 1476 wmic.exe Token: SeSystemtimePrivilege 1476 wmic.exe Token: SeProfSingleProcessPrivilege 1476 wmic.exe Token: SeIncBasePriorityPrivilege 1476 wmic.exe Token: SeCreatePagefilePrivilege 1476 wmic.exe Token: SeBackupPrivilege 1476 wmic.exe Token: SeRestorePrivilege 1476 wmic.exe Token: SeShutdownPrivilege 1476 wmic.exe Token: SeDebugPrivilege 1476 wmic.exe Token: SeSystemEnvironmentPrivilege 1476 wmic.exe Token: SeRemoteShutdownPrivilege 1476 wmic.exe Token: SeUndockPrivilege 1476 wmic.exe Token: SeManageVolumePrivilege 1476 wmic.exe Token: 33 1476 wmic.exe Token: 34 1476 wmic.exe Token: 35 1476 wmic.exe Token: SeIncreaseQuotaPrivilege 1476 wmic.exe Token: SeSecurityPrivilege 1476 wmic.exe Token: SeTakeOwnershipPrivilege 1476 wmic.exe Token: SeLoadDriverPrivilege 1476 wmic.exe Token: SeSystemProfilePrivilege 1476 wmic.exe Token: SeSystemtimePrivilege 1476 wmic.exe Token: SeProfSingleProcessPrivilege 1476 wmic.exe Token: SeIncBasePriorityPrivilege 1476 wmic.exe Token: SeCreatePagefilePrivilege 1476 wmic.exe Token: SeBackupPrivilege 1476 wmic.exe Token: SeRestorePrivilege 1476 wmic.exe Token: SeShutdownPrivilege 1476 wmic.exe Token: SeDebugPrivilege 1476 wmic.exe Token: SeSystemEnvironmentPrivilege 1476 wmic.exe Token: SeRemoteShutdownPrivilege 1476 wmic.exe Token: SeUndockPrivilege 1476 wmic.exe Token: SeManageVolumePrivilege 1476 wmic.exe Token: 33 1476 wmic.exe Token: 34 1476 wmic.exe Token: 35 1476 wmic.exe Token: 33 1588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1588 AUDIODG.EXE Token: 33 1588 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1588 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1468 1668 regsvr32.exe 27 PID 1468 wrote to memory of 1476 1468 regsvr32.exe 34 PID 1468 wrote to memory of 1476 1468 regsvr32.exe 34 PID 1468 wrote to memory of 1476 1468 regsvr32.exe 34 PID 1468 wrote to memory of 1476 1468 regsvr32.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\79a294ba27ab2b9ce227813ea9f02396e87838dcf7539167d5d6d9180fb0a26b.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\wbem\wmic.exe"C:\m\grt\gyf\..\..\..\Windows\os\..\system32\spds\f\..\..\wbem\q\lt\..\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2036
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588