Analysis
-
max time kernel
165s -
max time network
189s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-02-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe
Resource
win10v2004-en-20220113
General
-
Target
4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe
-
Size
354KB
-
MD5
09e61348c89279d1f31159cc152a33ac
-
SHA1
1fc77fba10690bf81fa0b25ff1d74b23ff092d7e
-
SHA256
4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69
-
SHA512
fdcdf8a50118f8cf2f379d755bdfc5c1c9c3ffa3fc333fc98ad9b24f4894763dfdb82c33e7edf6849b8c50c7b403f2a5ce64dd0935724c7cf9b973761ff237c7
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/88380999473507da
https://mazedecrypt.top/88380999473507da
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CopyInvoke.crw => C:\Users\Admin\Pictures\CopyInvoke.crw.2nZVk 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File renamed C:\Users\Admin\Pictures\DebugCompress.png => C:\Users\Admin\Pictures\DebugCompress.png.2nZVk 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File renamed C:\Users\Admin\Pictures\NewMount.raw => C:\Users\Admin\Pictures\NewMount.raw.t1Qei 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File opened for modification C:\Users\Admin\Pictures\PingEnter.tiff 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File renamed C:\Users\Admin\Pictures\PingEnter.tiff => C:\Users\Admin\Pictures\PingEnter.tiff.t1Qei 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File renamed C:\Users\Admin\Pictures\ShowReceive.tif => C:\Users\Admin\Pictures\ShowReceive.tif.5KU5u8 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lmxr27f.tmp 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 1480 vssvc.exe Token: SeRestorePrivilege 1480 vssvc.exe Token: SeAuditPrivilege 1480 vssvc.exe Token: SeIncreaseQuotaPrivilege 1616 wmic.exe Token: SeSecurityPrivilege 1616 wmic.exe Token: SeTakeOwnershipPrivilege 1616 wmic.exe Token: SeLoadDriverPrivilege 1616 wmic.exe Token: SeSystemProfilePrivilege 1616 wmic.exe Token: SeSystemtimePrivilege 1616 wmic.exe Token: SeProfSingleProcessPrivilege 1616 wmic.exe Token: SeIncBasePriorityPrivilege 1616 wmic.exe Token: SeCreatePagefilePrivilege 1616 wmic.exe Token: SeBackupPrivilege 1616 wmic.exe Token: SeRestorePrivilege 1616 wmic.exe Token: SeShutdownPrivilege 1616 wmic.exe Token: SeDebugPrivilege 1616 wmic.exe Token: SeSystemEnvironmentPrivilege 1616 wmic.exe Token: SeRemoteShutdownPrivilege 1616 wmic.exe Token: SeUndockPrivilege 1616 wmic.exe Token: SeManageVolumePrivilege 1616 wmic.exe Token: 33 1616 wmic.exe Token: 34 1616 wmic.exe Token: 35 1616 wmic.exe Token: SeIncreaseQuotaPrivilege 1616 wmic.exe Token: SeSecurityPrivilege 1616 wmic.exe Token: SeTakeOwnershipPrivilege 1616 wmic.exe Token: SeLoadDriverPrivilege 1616 wmic.exe Token: SeSystemProfilePrivilege 1616 wmic.exe Token: SeSystemtimePrivilege 1616 wmic.exe Token: SeProfSingleProcessPrivilege 1616 wmic.exe Token: SeIncBasePriorityPrivilege 1616 wmic.exe Token: SeCreatePagefilePrivilege 1616 wmic.exe Token: SeBackupPrivilege 1616 wmic.exe Token: SeRestorePrivilege 1616 wmic.exe Token: SeShutdownPrivilege 1616 wmic.exe Token: SeDebugPrivilege 1616 wmic.exe Token: SeSystemEnvironmentPrivilege 1616 wmic.exe Token: SeRemoteShutdownPrivilege 1616 wmic.exe Token: SeUndockPrivilege 1616 wmic.exe Token: SeManageVolumePrivilege 1616 wmic.exe Token: 33 1616 wmic.exe Token: 34 1616 wmic.exe Token: 35 1616 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1616 1128 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe 35 PID 1128 wrote to memory of 1616 1128 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe 35 PID 1128 wrote to memory of 1616 1128 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe 35 PID 1128 wrote to memory of 1616 1128 4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe"C:\Users\Admin\AppData\Local\Temp\4feb2e00c0dc0c42f42fd2c93f48e350c37386768e7774f82cdc98c8bc8dbc69.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\wbem\wmic.exe"C:\mjwv\yifx\..\..\Windows\u\ccto\..\..\system32\rawsv\..\wbem\sdlf\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480