Analysis
-
max time kernel
169s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 22:59
Static task
static1
Behavioral task
behavioral1
Sample
543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b.dll
Resource
win10v2004-en-20220112
General
-
Target
543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b.dll
-
Size
593KB
-
MD5
1f248135b858fd13de23d69df2393010
-
SHA1
5665c4e9a9c5eaf7ab7d489699fc644c6127c5d3
-
SHA256
543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b
-
SHA512
4a7b82fff7543ad91c398ad50a908d3cf103edda7d3d409cc47368c5c02ff0609057b92d8a4dbeac9a41c3f6355b2a0789ea2bdd7548290da3008881341be1a2
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c610cc5a3a975a8
https://mazedecrypt.top/6c610cc5a3a975a8
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RepairUnprotect.tiff => C:\Users\Admin\Pictures\RepairUnprotect.tiff.va5z regsvr32.exe File renamed C:\Users\Admin\Pictures\RevokeReceive.crw => C:\Users\Admin\Pictures\RevokeReceive.crw.va5z regsvr32.exe File renamed C:\Users\Admin\Pictures\SearchWait.crw => C:\Users\Admin\Pictures\SearchWait.crw.rDSO4 regsvr32.exe File renamed C:\Users\Admin\Pictures\StepRegister.crw => C:\Users\Admin\Pictures\StepRegister.crw.rDSO4 regsvr32.exe File renamed C:\Users\Admin\Pictures\SwitchPush.crw => C:\Users\Admin\Pictures\SwitchPush.crw.rDSO4 regsvr32.exe File renamed C:\Users\Admin\Pictures\GetSet.png => C:\Users\Admin\Pictures\GetSet.png.x1SskGA regsvr32.exe File renamed C:\Users\Admin\Pictures\PushSuspend.raw => C:\Users\Admin\Pictures\PushSuspend.raw.va5z regsvr32.exe File opened for modification C:\Users\Admin\Pictures\RepairUnprotect.tiff regsvr32.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c610cc5a3a975a8.tmp regsvr32.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\6c610cc5a3a975a8.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\6c610cc5a3a975a8.tmp regsvr32.exe File opened for modification C:\Program Files\EnableFind.jtx regsvr32.exe File opened for modification C:\Program Files\EnableTrace.pot regsvr32.exe File opened for modification C:\Program Files\PingLimit.mpg regsvr32.exe File opened for modification C:\Program Files\ReceiveResolve.iso regsvr32.exe File opened for modification C:\Program Files\RepairSave.php regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6c610cc5a3a975a8.tmp regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\ConvertAdd.mhtml regsvr32.exe File opened for modification C:\Program Files\DismountCheckpoint.wma regsvr32.exe File opened for modification C:\Program Files\UnblockUnregister.vssx regsvr32.exe File opened for modification C:\Program Files\UndoLock.3gp2 regsvr32.exe File opened for modification C:\Program Files\UnprotectUpdate.xml regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\JoinSet.vdw regsvr32.exe File opened for modification C:\Program Files\SaveCheckpoint.tiff regsvr32.exe File opened for modification C:\Program Files\WatchSearch.rm regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6c610cc5a3a975a8.tmp regsvr32.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6c610cc5a3a975a8.tmp regsvr32.exe File opened for modification C:\Program Files\CloseWait.xlsx regsvr32.exe File opened for modification C:\Program Files\ConvertToSync.css regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1536 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1696 vssvc.exe Token: SeRestorePrivilege 1696 vssvc.exe Token: SeAuditPrivilege 1696 vssvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27 PID 880 wrote to memory of 1536 880 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b.dll1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\543f72aaf9b4e0b2b5aa1dfb01ba9ee981f012bb1ea0029f2da35f3962b1f47b.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696