Analysis
-
max time kernel
173s -
max time network
192s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:58
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-en-20220113
General
-
Target
sample.exe
-
Size
363KB
-
MD5
f83cef2bf33a4d43e58b771e81af3ecc
-
SHA1
12133b783cef924cbc2911deb11cba148d97dad4
-
SHA256
bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015
-
SHA512
0d0ed1846d8cf5cba89c1eaa952110b420b4ef0684f4b4c00bd7db47e5d6f72639a90e3725520b5502dbfe35b8a875256b5163bcee25b2264d0e2dfe210e5c9a
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6d570cc86e4b5425
https://mazedecrypt.top/6d570cc86e4b5425
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff sample.exe File renamed C:\Users\Admin\Pictures\SubmitLimit.tiff => C:\Users\Admin\Pictures\SubmitLimit.tiff.hXGLqi sample.exe File renamed C:\Users\Admin\Pictures\SuspendSkip.tif => C:\Users\Admin\Pictures\SuspendSkip.tif.ytXu0yM sample.exe File renamed C:\Users\Admin\Pictures\UnlockSubmit.png => C:\Users\Admin\Pictures\UnlockSubmit.png.ytXu0yM sample.exe File renamed C:\Users\Admin\Pictures\HideConvert.tif => C:\Users\Admin\Pictures\HideConvert.tif.vljZv sample.exe File renamed C:\Users\Admin\Pictures\InstallRequest.png => C:\Users\Admin\Pictures\InstallRequest.png.vljZv sample.exe File renamed C:\Users\Admin\Pictures\MountDisable.crw => C:\Users\Admin\Pictures\MountDisable.crw.vljZv sample.exe File renamed C:\Users\Admin\Pictures\RepairTest.crw => C:\Users\Admin\Pictures\RepairTest.crw.OC80Jm sample.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt sample.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6d570cc86e4b5425.tmp sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" sample.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files\InvokeUninstall.zip sample.exe File opened for modification C:\Program Files\SendStart.wax sample.exe File opened for modification C:\Program Files\UnprotectStart.aiff sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6d570cc86e4b5425.tmp sample.exe File created C:\Program Files\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\StartDismount.ini sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6d570cc86e4b5425.tmp sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\EnableTest.cab sample.exe File opened for modification C:\Program Files\SubmitBackup.3gp2 sample.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files\GrantConfirm.WTV sample.exe File opened for modification C:\Program Files\SubmitShow.wax sample.exe File opened for modification C:\Program Files\RepairSplit.cab sample.exe File opened for modification C:\Program Files\6d570cc86e4b5425.tmp sample.exe File opened for modification C:\Program Files\ClearProtect.hta sample.exe File opened for modification C:\Program Files\CompressEdit.sql sample.exe File opened for modification C:\Program Files\ShowExit.pps sample.exe File opened for modification C:\Program Files\DisconnectGet.wmf sample.exe File opened for modification C:\Program Files\FindSuspend.wmf sample.exe File opened for modification C:\Program Files\RevokeSearch.xps sample.exe File opened for modification C:\Program Files\WaitInvoke.pcx sample.exe File opened for modification C:\Program Files\ClearTest.wax sample.exe File opened for modification C:\Program Files\EditOpen.mp4v sample.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt sample.exe File opened for modification C:\Program Files (x86)\6d570cc86e4b5425.tmp sample.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6d570cc86e4b5425.tmp sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1624 sample.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 548 vssvc.exe Token: SeRestorePrivilege 548 vssvc.exe Token: SeAuditPrivilege 548 vssvc.exe Token: SeIncreaseQuotaPrivilege 972 wmic.exe Token: SeSecurityPrivilege 972 wmic.exe Token: SeTakeOwnershipPrivilege 972 wmic.exe Token: SeLoadDriverPrivilege 972 wmic.exe Token: SeSystemProfilePrivilege 972 wmic.exe Token: SeSystemtimePrivilege 972 wmic.exe Token: SeProfSingleProcessPrivilege 972 wmic.exe Token: SeIncBasePriorityPrivilege 972 wmic.exe Token: SeCreatePagefilePrivilege 972 wmic.exe Token: SeBackupPrivilege 972 wmic.exe Token: SeRestorePrivilege 972 wmic.exe Token: SeShutdownPrivilege 972 wmic.exe Token: SeDebugPrivilege 972 wmic.exe Token: SeSystemEnvironmentPrivilege 972 wmic.exe Token: SeRemoteShutdownPrivilege 972 wmic.exe Token: SeUndockPrivilege 972 wmic.exe Token: SeManageVolumePrivilege 972 wmic.exe Token: 33 972 wmic.exe Token: 34 972 wmic.exe Token: 35 972 wmic.exe Token: SeIncreaseQuotaPrivilege 972 wmic.exe Token: SeSecurityPrivilege 972 wmic.exe Token: SeTakeOwnershipPrivilege 972 wmic.exe Token: SeLoadDriverPrivilege 972 wmic.exe Token: SeSystemProfilePrivilege 972 wmic.exe Token: SeSystemtimePrivilege 972 wmic.exe Token: SeProfSingleProcessPrivilege 972 wmic.exe Token: SeIncBasePriorityPrivilege 972 wmic.exe Token: SeCreatePagefilePrivilege 972 wmic.exe Token: SeBackupPrivilege 972 wmic.exe Token: SeRestorePrivilege 972 wmic.exe Token: SeShutdownPrivilege 972 wmic.exe Token: SeDebugPrivilege 972 wmic.exe Token: SeSystemEnvironmentPrivilege 972 wmic.exe Token: SeRemoteShutdownPrivilege 972 wmic.exe Token: SeUndockPrivilege 972 wmic.exe Token: SeManageVolumePrivilege 972 wmic.exe Token: 33 972 wmic.exe Token: 34 972 wmic.exe Token: 35 972 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 972 1624 sample.exe 35 PID 1624 wrote to memory of 972 1624 sample.exe 35 PID 1624 wrote to memory of 972 1624 sample.exe 35 PID 1624 wrote to memory of 972 1624 sample.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\wbem\wmic.exe"C:\gw\h\..\..\Windows\j\vg\jg\..\..\..\system32\dd\..\wbem\fci\ocl\c\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:548
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:628