Analysis
-
max time kernel
164s -
max time network
178s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:55
Static task
static1
Behavioral task
behavioral1
Sample
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe
Resource
win10v2004-en-20220112
General
-
Target
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe
-
Size
384KB
-
MD5
a6c6d9747407034817b1b0e739cc07d7
-
SHA1
545f28e3ac5e91665fc0f36671594c081971db4f
-
SHA256
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c
-
SHA512
d64834e13454c7e72707cf249da770abf9cc74f1ad6d55fb7c396d7246aa6bd8c9a7d4a95fec24ab7aa27df9f034d6dc913dd7ae87b72d918935fc9e373eb895
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/892e099c4083c118
https://mazedecrypt.top/892e099c4083c118
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exedescription ioc Process File renamed C:\Users\Admin\Pictures\StopSet.tiff => C:\Users\Admin\Pictures\StopSet.tiff.EL0l9 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Users\Admin\Pictures\UpdateGet.tiff 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\UpdateGet.tiff => C:\Users\Admin\Pictures\UpdateGet.tiff.paJIl 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\MountGrant.raw => C:\Users\Admin\Pictures\MountGrant.raw.jhlr 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\PushUnregister.raw => C:\Users\Admin\Pictures\PushUnregister.raw.jhlr 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\ShowGrant.tiff => C:\Users\Admin\Pictures\ShowGrant.tiff.EL0l9 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Users\Admin\Pictures\StopSet.tiff 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\ExpandGet.png => C:\Users\Admin\Pictures\ExpandGet.png.Qnda 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Users\Admin\Pictures\ShowGrant.tiff 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File renamed C:\Users\Admin\Pictures\UnblockExit.tif => C:\Users\Admin\Pictures\UnblockExit.tif.EL0l9 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe -
Drops startup file 2 IoCs
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe -
Drops file in Program Files directory 47 IoCs
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exedescription ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File created C:\Program Files\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\EditSwitch.ttf 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ImportGet.ps1 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\GetEnable.mpp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ResetUninstall.ttc 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\StepRestore.odt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\WatchDeny.cmd 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ClosePush.M2TS 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ConvertToSync.pptm 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\InstallShow.htm 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ResetRevoke.asf 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\RestoreWait.cab 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\RevokeDebug.rtf 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\UnlockBlock.easmx 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ConvertEdit.jfif 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ConvertToNew.TS 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\FormatExpand.xps 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\NewBlock.xml 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\PopOut.vssm 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\PingPush.svgz 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\RemoveInitialize.ppt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\StartDisconnect.7z 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\SubmitTest.mpg 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\UnlockClear.wps 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\CopyConfirm.mov 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\DisconnectRemove.xsl 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\MountNew.mpg 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ResetDebug.ex_ 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\ResolveRequest.ods 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\CheckpointSubmit.docx 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\CompleteCheckpoint.pptm 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\InvokeUpdate.dotx 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\RedoSplit.TTS 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\RequestPublish.gif 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\UnprotectExit.reg 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files (x86)\892e099c4083c118.tmp 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\AddInitialize.mpeg3 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\CompareStep.ps1 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe File opened for modification C:\Program Files\GroupResume.js 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exepid Process 956 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
vssvc.exewmic.exedescription pid Process Token: SeBackupPrivilege 1380 vssvc.exe Token: SeRestorePrivilege 1380 vssvc.exe Token: SeAuditPrivilege 1380 vssvc.exe Token: SeIncreaseQuotaPrivilege 2028 wmic.exe Token: SeSecurityPrivilege 2028 wmic.exe Token: SeTakeOwnershipPrivilege 2028 wmic.exe Token: SeLoadDriverPrivilege 2028 wmic.exe Token: SeSystemProfilePrivilege 2028 wmic.exe Token: SeSystemtimePrivilege 2028 wmic.exe Token: SeProfSingleProcessPrivilege 2028 wmic.exe Token: SeIncBasePriorityPrivilege 2028 wmic.exe Token: SeCreatePagefilePrivilege 2028 wmic.exe Token: SeBackupPrivilege 2028 wmic.exe Token: SeRestorePrivilege 2028 wmic.exe Token: SeShutdownPrivilege 2028 wmic.exe Token: SeDebugPrivilege 2028 wmic.exe Token: SeSystemEnvironmentPrivilege 2028 wmic.exe Token: SeRemoteShutdownPrivilege 2028 wmic.exe Token: SeUndockPrivilege 2028 wmic.exe Token: SeManageVolumePrivilege 2028 wmic.exe Token: 33 2028 wmic.exe Token: 34 2028 wmic.exe Token: 35 2028 wmic.exe Token: SeIncreaseQuotaPrivilege 2028 wmic.exe Token: SeSecurityPrivilege 2028 wmic.exe Token: SeTakeOwnershipPrivilege 2028 wmic.exe Token: SeLoadDriverPrivilege 2028 wmic.exe Token: SeSystemProfilePrivilege 2028 wmic.exe Token: SeSystemtimePrivilege 2028 wmic.exe Token: SeProfSingleProcessPrivilege 2028 wmic.exe Token: SeIncBasePriorityPrivilege 2028 wmic.exe Token: SeCreatePagefilePrivilege 2028 wmic.exe Token: SeBackupPrivilege 2028 wmic.exe Token: SeRestorePrivilege 2028 wmic.exe Token: SeShutdownPrivilege 2028 wmic.exe Token: SeDebugPrivilege 2028 wmic.exe Token: SeSystemEnvironmentPrivilege 2028 wmic.exe Token: SeRemoteShutdownPrivilege 2028 wmic.exe Token: SeUndockPrivilege 2028 wmic.exe Token: SeManageVolumePrivilege 2028 wmic.exe Token: 33 2028 wmic.exe Token: 34 2028 wmic.exe Token: 35 2028 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exedescription pid Process procid_target PID 956 wrote to memory of 2028 956 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe 34 PID 956 wrote to memory of 2028 956 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe 34 PID 956 wrote to memory of 2028 956 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe 34 PID 956 wrote to memory of 2028 956 65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe"C:\Users\Admin\AppData\Local\Temp\65774dcf6d6e9a55be4250a1c95c93a92913bdbfcffce66af4bf7c8f4719489c.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\wbem\wmic.exe"C:\yflw\a\..\..\Windows\gcoi\nyk\..\..\system32\d\..\wbem\amp\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1052