Analysis
-
max time kernel
168s -
max time network
195s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:58
Static task
static1
Behavioral task
behavioral1
Sample
5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe
Resource
win10v2004-en-20220112
General
-
Target
5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe
-
Size
364KB
-
MD5
d7d5907195cda040a984062294fcdbd5
-
SHA1
ba52267c305ff9bc6f02fa9c5ebcb690ccb267eb
-
SHA256
5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18
-
SHA512
9871626b5f043583dc1f707386304d372a34734e03938d9f97d1ab3281be720ce3c1fed6b5bb78f5c24949fb6b18b5df8c57a456ac4c39bd7063579f1921b9b4
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8838099922a094c6
https://mazedecrypt.top/8838099922a094c6
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ConfirmCompress.png => C:\Users\Admin\Pictures\ConfirmCompress.png.sneU 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Users\Admin\Pictures\GrantRemove.tiff 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File renamed C:\Users\Admin\Pictures\GrantRemove.tiff => C:\Users\Admin\Pictures\GrantRemove.tiff.wgonW 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File renamed C:\Users\Admin\Pictures\MeasureUnregister.png => C:\Users\Admin\Pictures\MeasureUnregister.png.wgonW 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File renamed C:\Users\Admin\Pictures\UnblockWait.png => C:\Users\Admin\Pictures\UnblockWait.png.gKMFk 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 41 IoCs
description ioc Process File opened for modification C:\Program Files\ResolveNew.dot 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files (x86)\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\CopyBackup.DVR 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\FormatBackup.lock 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\MeasureConvert.vssx 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\RestartRead.m1v 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\DisableConvertTo.scf 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\InitializeAssert.mhtml 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\ResetReceive.docx 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\WriteStop.xlsm 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\DisableRemove.au 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\DisconnectProtect.reg 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\FindEdit.vdw 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\MountEdit.mp2v 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\ReadSubmit.ppsm 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\SelectApprove.M2V 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\TestClear.mpv2 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\WriteMove.xltx 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\CloseRegister.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\DisableSuspend.odp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\PopPush.avi 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\PublishResolve.mp4v 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\AddOpen.bin 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\AssertRestart.svgz 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\JoinFind.midi 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\PopDeny.mp2 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File created C:\Program Files\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\PopDisable.mp3 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\RenameComplete.jpeg 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\SubmitDeny.vbs 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\SuspendUndo.vsdx 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\UnprotectSend.js 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files\EnableCheckpoint.xhtml 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\8838099922a094c6.tmp 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1056 5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1164 vssvc.exe Token: SeRestorePrivilege 1164 vssvc.exe Token: SeAuditPrivilege 1164 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe"C:\Users\Admin\AppData\Local\Temp\5acbcc1df967d37bf86e429030c9c8ad43e84c8ec5d74bfe3737816c74994c18.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164