Analysis
-
max time kernel
176s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
16-02-2022 22:54
Static task
static1
Behavioral task
behavioral1
Sample
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
Resource
win10v2004-en-20220112
General
-
Target
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe
-
Size
486KB
-
MD5
a66202a5f7e693196a03ebb371ab5c5f
-
SHA1
1d55ed4048f1ab5fc485776081526e758297e214
-
SHA256
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5
-
SHA512
946a34003e65eafb866db270d90477bfa0828e230e42b7a998d11bddce21ca72fe31f23add3c714c4dcbb2c6c7e55df7328f662529819d3874e8973e78d4a5cf
Malware Config
Extracted
C:\DECRYPT-FILES.html
<b>[email protected]</b>
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 19 IoCs
Processes:
svchost.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exepid Process 3720 71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe 3720 71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
wmic.exevssvc.exedescription pid Process Token: SeIncreaseQuotaPrivilege 804 wmic.exe Token: SeSecurityPrivilege 804 wmic.exe Token: SeTakeOwnershipPrivilege 804 wmic.exe Token: SeLoadDriverPrivilege 804 wmic.exe Token: SeSystemProfilePrivilege 804 wmic.exe Token: SeSystemtimePrivilege 804 wmic.exe Token: SeProfSingleProcessPrivilege 804 wmic.exe Token: SeIncBasePriorityPrivilege 804 wmic.exe Token: SeCreatePagefilePrivilege 804 wmic.exe Token: SeBackupPrivilege 804 wmic.exe Token: SeRestorePrivilege 804 wmic.exe Token: SeShutdownPrivilege 804 wmic.exe Token: SeDebugPrivilege 804 wmic.exe Token: SeSystemEnvironmentPrivilege 804 wmic.exe Token: SeRemoteShutdownPrivilege 804 wmic.exe Token: SeUndockPrivilege 804 wmic.exe Token: SeManageVolumePrivilege 804 wmic.exe Token: 33 804 wmic.exe Token: 34 804 wmic.exe Token: 35 804 wmic.exe Token: 36 804 wmic.exe Token: SeIncreaseQuotaPrivilege 804 wmic.exe Token: SeSecurityPrivilege 804 wmic.exe Token: SeTakeOwnershipPrivilege 804 wmic.exe Token: SeLoadDriverPrivilege 804 wmic.exe Token: SeSystemProfilePrivilege 804 wmic.exe Token: SeSystemtimePrivilege 804 wmic.exe Token: SeProfSingleProcessPrivilege 804 wmic.exe Token: SeIncBasePriorityPrivilege 804 wmic.exe Token: SeCreatePagefilePrivilege 804 wmic.exe Token: SeBackupPrivilege 804 wmic.exe Token: SeRestorePrivilege 804 wmic.exe Token: SeShutdownPrivilege 804 wmic.exe Token: SeDebugPrivilege 804 wmic.exe Token: SeSystemEnvironmentPrivilege 804 wmic.exe Token: SeRemoteShutdownPrivilege 804 wmic.exe Token: SeUndockPrivilege 804 wmic.exe Token: SeManageVolumePrivilege 804 wmic.exe Token: 33 804 wmic.exe Token: 34 804 wmic.exe Token: 35 804 wmic.exe Token: 36 804 wmic.exe Token: SeBackupPrivilege 1924 vssvc.exe Token: SeRestorePrivilege 1924 vssvc.exe Token: SeAuditPrivilege 1924 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exedescription pid Process procid_target PID 3720 wrote to memory of 804 3720 71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe 64 PID 3720 wrote to memory of 804 3720 71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe 64
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe"C:\Users\Admin\AppData\Local\Temp\71b684c0b52bfa1a8b79ee57b99af14a87b977489c08d002b784bdf7584993c5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\system32\wbem\wmic.exe"C:\qv\..\Windows\x\dsnh\..\..\system32\ur\dp\..\..\wbem\aw\stw\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:3264
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Modifies data under HKEY_USERS
PID:3196