Analysis
-
max time kernel
165s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-02-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe
Resource
win10v2004-en-20220113
General
-
Target
4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe
-
Size
513KB
-
MD5
26328ef6a8d0476111b18a14fb84227b
-
SHA1
0386e019f5d1b581f75ba8a91dd204a0ffb7c8e1
-
SHA256
4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c
-
SHA512
c74660fff3e5e82fba0bc57955f0a68f350eec7aebb40a0322ea81818ee61859a20cf47e94a35d531b98b83cca852a45e5e9ecc2ffce531b14c145f88432d97f
Malware Config
Extracted
C:\DECRYPT-FILES.html
<b>[email protected]</b>
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4972 4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe 4972 4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1692 wmic.exe Token: SeSecurityPrivilege 1692 wmic.exe Token: SeTakeOwnershipPrivilege 1692 wmic.exe Token: SeLoadDriverPrivilege 1692 wmic.exe Token: SeSystemProfilePrivilege 1692 wmic.exe Token: SeSystemtimePrivilege 1692 wmic.exe Token: SeProfSingleProcessPrivilege 1692 wmic.exe Token: SeIncBasePriorityPrivilege 1692 wmic.exe Token: SeCreatePagefilePrivilege 1692 wmic.exe Token: SeBackupPrivilege 1692 wmic.exe Token: SeRestorePrivilege 1692 wmic.exe Token: SeShutdownPrivilege 1692 wmic.exe Token: SeDebugPrivilege 1692 wmic.exe Token: SeSystemEnvironmentPrivilege 1692 wmic.exe Token: SeRemoteShutdownPrivilege 1692 wmic.exe Token: SeUndockPrivilege 1692 wmic.exe Token: SeManageVolumePrivilege 1692 wmic.exe Token: 33 1692 wmic.exe Token: 34 1692 wmic.exe Token: 35 1692 wmic.exe Token: 36 1692 wmic.exe Token: SeIncreaseQuotaPrivilege 1692 wmic.exe Token: SeSecurityPrivilege 1692 wmic.exe Token: SeTakeOwnershipPrivilege 1692 wmic.exe Token: SeLoadDriverPrivilege 1692 wmic.exe Token: SeSystemProfilePrivilege 1692 wmic.exe Token: SeSystemtimePrivilege 1692 wmic.exe Token: SeProfSingleProcessPrivilege 1692 wmic.exe Token: SeIncBasePriorityPrivilege 1692 wmic.exe Token: SeCreatePagefilePrivilege 1692 wmic.exe Token: SeBackupPrivilege 1692 wmic.exe Token: SeRestorePrivilege 1692 wmic.exe Token: SeShutdownPrivilege 1692 wmic.exe Token: SeDebugPrivilege 1692 wmic.exe Token: SeSystemEnvironmentPrivilege 1692 wmic.exe Token: SeRemoteShutdownPrivilege 1692 wmic.exe Token: SeUndockPrivilege 1692 wmic.exe Token: SeManageVolumePrivilege 1692 wmic.exe Token: 33 1692 wmic.exe Token: 34 1692 wmic.exe Token: 35 1692 wmic.exe Token: 36 1692 wmic.exe Token: SeBackupPrivilege 3240 vssvc.exe Token: SeRestorePrivilege 3240 vssvc.exe Token: SeAuditPrivilege 3240 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1692 4972 4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe 85 PID 4972 wrote to memory of 1692 4972 4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe"C:\Users\Admin\AppData\Local\Temp\4ff7eb34e69bc60cb01eea3098f88f4b729d4158b14939b012247b341452a75c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\wbem\wmic.exe"C:\mdw\..\Windows\g\nc\..\..\system32\vhsqp\..\wbem\snv\j\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3240