Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 22:57
Static task
static1
Behavioral task
behavioral1
Sample
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe
Resource
win10v2004-en-20220113
General
-
Target
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe
-
Size
479KB
-
MD5
fba4cbb7167176990d5a8d24e9505f71
-
SHA1
aa6cd2698d4f9a7fa99f5807f4b6695a0bfd0124
-
SHA256
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353
-
SHA512
bac75260a52e7501afb5e87340e68528c10cdc26d516ed5ac6bbc1a5a36162377edf9722eedfd1393b35ed87a77258e89db3c4097d95fadd24df13938f298b94
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8802099c27d42492
https://mazedecrypt.top/8802099c27d42492
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exedescription ioc Process File renamed C:\Users\Admin\Pictures\ConvertToPublish.tif => C:\Users\Admin\Pictures\ConvertToPublish.tif.t6Kz7t 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\ConvertUnpublish.tif => C:\Users\Admin\Pictures\ConvertUnpublish.tif.t6Kz7t 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\GroupPush.crw => C:\Users\Admin\Pictures\GroupPush.crw.t6Kz7t 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\MountRevoke.crw => C:\Users\Admin\Pictures\MountRevoke.crw.jnnOhj 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\MoveWatch.crw => C:\Users\Admin\Pictures\MoveWatch.crw.jnnOhj 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\RequestDebug.png => C:\Users\Admin\Pictures\RequestDebug.png.zKKJ 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Users\Admin\Pictures\SubmitWatch.tiff 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File renamed C:\Users\Admin\Pictures\SubmitWatch.tiff => C:\Users\Admin\Pictures\SubmitWatch.tiff.zKKJ 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe -
Windows Defender anti-emulation file check 1 TTPs
Defender's emulator always creates certain fake files which can be used to detect it.
-
Drops startup file 4 IoCs
Processes:
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\074h97.tmp 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\074h97.tmp 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 36 IoCs
Processes:
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exedescription ioc Process File opened for modification C:\Program Files\MeasureRename.vbs 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\StepExit.mht 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\UnregisterImport.xla 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\HideRemove.vb 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\CopyUnlock.mp4 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\MergeConvert.TS 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\AssertMeasure.m3u 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ApproveRestart.potm 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\OptimizePing.dotx 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\RestartRemove.tiff 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ShowSelect.xltm 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\WriteResume.vbs 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\074h97.tmp 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ClearInvoke.vssx 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files (x86)\074h97.tmp 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File created C:\Program Files\DECRYPT-FILES.txt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ExportConfirm.mpe 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\SearchUndo.csv 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\DismountDebug.mov 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ImportStep.mpeg2 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ClearUnlock.ico 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\CompareEdit.mp4v 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ConvertEnter.dxf 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\DenyGrant.cab 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\GroupAdd.rmi 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ProtectMount.png 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\RevokeUnprotect.mpeg3 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\CheckpointGet.iso 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\DisconnectWatch.docx 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\ExportConfirm.odt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\MergeComplete.i64 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\NewSplit.ico 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\RepairDisconnect.ADTS 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\StartRename.xlt 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe File opened for modification C:\Program Files\CompareRevoke.xml 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exepid Process 1364 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe 1364 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
vssvc.exesvchost.exewmic.exedescription pid Process Token: SeBackupPrivilege 212 vssvc.exe Token: SeRestorePrivilege 212 vssvc.exe Token: SeAuditPrivilege 212 vssvc.exe Token: SeShutdownPrivilege 1888 svchost.exe Token: SeCreatePagefilePrivilege 1888 svchost.exe Token: SeShutdownPrivilege 1888 svchost.exe Token: SeCreatePagefilePrivilege 1888 svchost.exe Token: SeShutdownPrivilege 1888 svchost.exe Token: SeCreatePagefilePrivilege 1888 svchost.exe Token: SeIncreaseQuotaPrivilege 4408 wmic.exe Token: SeSecurityPrivilege 4408 wmic.exe Token: SeTakeOwnershipPrivilege 4408 wmic.exe Token: SeLoadDriverPrivilege 4408 wmic.exe Token: SeSystemProfilePrivilege 4408 wmic.exe Token: SeSystemtimePrivilege 4408 wmic.exe Token: SeProfSingleProcessPrivilege 4408 wmic.exe Token: SeIncBasePriorityPrivilege 4408 wmic.exe Token: SeCreatePagefilePrivilege 4408 wmic.exe Token: SeBackupPrivilege 4408 wmic.exe Token: SeRestorePrivilege 4408 wmic.exe Token: SeShutdownPrivilege 4408 wmic.exe Token: SeDebugPrivilege 4408 wmic.exe Token: SeSystemEnvironmentPrivilege 4408 wmic.exe Token: SeRemoteShutdownPrivilege 4408 wmic.exe Token: SeUndockPrivilege 4408 wmic.exe Token: SeManageVolumePrivilege 4408 wmic.exe Token: 33 4408 wmic.exe Token: 34 4408 wmic.exe Token: 35 4408 wmic.exe Token: 36 4408 wmic.exe Token: SeIncreaseQuotaPrivilege 4408 wmic.exe Token: SeSecurityPrivilege 4408 wmic.exe Token: SeTakeOwnershipPrivilege 4408 wmic.exe Token: SeLoadDriverPrivilege 4408 wmic.exe Token: SeSystemProfilePrivilege 4408 wmic.exe Token: SeSystemtimePrivilege 4408 wmic.exe Token: SeProfSingleProcessPrivilege 4408 wmic.exe Token: SeIncBasePriorityPrivilege 4408 wmic.exe Token: SeCreatePagefilePrivilege 4408 wmic.exe Token: SeBackupPrivilege 4408 wmic.exe Token: SeRestorePrivilege 4408 wmic.exe Token: SeShutdownPrivilege 4408 wmic.exe Token: SeDebugPrivilege 4408 wmic.exe Token: SeSystemEnvironmentPrivilege 4408 wmic.exe Token: SeRemoteShutdownPrivilege 4408 wmic.exe Token: SeUndockPrivilege 4408 wmic.exe Token: SeManageVolumePrivilege 4408 wmic.exe Token: 33 4408 wmic.exe Token: 34 4408 wmic.exe Token: 35 4408 wmic.exe Token: 36 4408 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exedescription pid Process procid_target PID 1364 wrote to memory of 4408 1364 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe 101 PID 1364 wrote to memory of 4408 1364 5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe"C:\Users\Admin\AppData\Local\Temp\5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\wbem\wmic.exe"C:\dh\..\Windows\evlgh\..\system32\vdnvv\lfv\d\..\..\..\wbem\jhjsh\nu\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1888