Analysis
-
max time kernel
165s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 22:59
Static task
static1
Behavioral task
behavioral1
Sample
5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe
Resource
win10v2004-en-20220113
General
-
Target
5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe
-
Size
365KB
-
MD5
89990fc332d5a7f4da0111e42132b7de
-
SHA1
caf2ec6c206bbf2ed433c434206c181ef0993788
-
SHA256
5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520
-
SHA512
6405f151a64ca174c05e40973abab3a8c40f5f6f1c984950be615b7709f75c3447e38f364e0145fffcc74a73394c7c74275f90451cb6a02513c4c99e644b0706
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/8802099c31f09bed
https://mazedecrypt.top/8802099c31f09bed
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8802099c31f09bed.tmp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\8802099c31f09bed.tmp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\OpenHide.ogg 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ResolveResume.wma 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SelectClose.csv 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\EnableAdd.css 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\EnableConnect.mpe 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\GroupFormat.clr 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\MergeWatch.WTV 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\NewRepair.txt 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files (x86)\8802099c31f09bed.tmp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\AssertClose.mp3 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\UnpublishStop.vsdm 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\WatchTrace.xla 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\EnterRequest.aiff 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ResumeFormat.zip 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\RevokeOptimize.potm 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SaveMerge.wdp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SetConvert.7z 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\CheckpointTest.ADT 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\EnterRegister.mpa 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\GrantCompare.mpv2 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\TraceReset.emf 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ProtectPop.TTS 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\PublishUnprotect.aif 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SyncRead.rmi 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\8802099c31f09bed.tmp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\CompressImport.wax 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ConfirmDismount.eps 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ExitCopy.dib 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\OutShow.001 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\UninstallUndo.vssm 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\TestSave.mp2v 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\WatchReset.mpg 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\CompleteSelect.svg 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\ExitMerge.jpe 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\FindDebug.tmp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\GetImport.mpp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\NewResume.docx 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File created C:\Program Files\DECRYPT-FILES.txt 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\BackupSubmit.emz 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SaveWrite.3gp 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SetUnpublish.ADTS 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe File opened for modification C:\Program Files\SwitchDisable.shtml 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4580 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe 4580 5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 4648 vssvc.exe Token: SeRestorePrivilege 4648 vssvc.exe Token: SeAuditPrivilege 4648 vssvc.exe Token: SeShutdownPrivilege 2568 svchost.exe Token: SeCreatePagefilePrivilege 2568 svchost.exe Token: SeShutdownPrivilege 2568 svchost.exe Token: SeCreatePagefilePrivilege 2568 svchost.exe Token: SeShutdownPrivilege 2568 svchost.exe Token: SeCreatePagefilePrivilege 2568 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe"C:\Users\Admin\AppData\Local\Temp\5a06ae8540d5a0d7fb88e80d3e61c3a6079f3abdafe998ce70ffdcac9e940520.exe"1⤵
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2568