Analysis
-
max time kernel
160s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 23:17
Static task
static1
Behavioral task
behavioral1
Sample
38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe
Resource
win7-20220414-en
General
-
Target
38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe
-
Size
3.7MB
-
MD5
e14c0622af40260fec213c4100605bfb
-
SHA1
2cc388e5e5ccb150604e3e5c0a715a8974a274c7
-
SHA256
38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6
-
SHA512
e0ae9b2f70b6460672079b907cd30fc228b2245b60315561651a09de1516424aeb770383b5cd7468926c5cfb221f130787d536d87b0941fe09cdb47af40a2d05
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/87c609897feb7e9c
https://mazedecrypt.top/87c609897feb7e9c
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
suricata: ET MALWARE Maze/ID Ransomware Activity
suricata: ET MALWARE Maze/ID Ransomware Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SkipSubmit.tiff 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\SkipSubmit.tiff => C:\Users\Admin\Pictures\SkipSubmit.tiff.E5ZOG 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\DismountExport.png => C:\Users\Admin\Pictures\DismountExport.png.4kFlr5Y 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\DismountWait.tif => C:\Users\Admin\Pictures\DismountWait.tif.4kFlr5Y 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\ExportInitialize.raw => C:\Users\Admin\Pictures\ExportInitialize.raw.4kFlr5Y 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Users\Admin\Pictures\OptimizeExport.tiff 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\OptimizeExport.tiff => C:\Users\Admin\Pictures\OptimizeExport.tiff.DrFH 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File renamed C:\Users\Admin\Pictures\PublishEnable.crw => C:\Users\Admin\Pictures\PublishEnable.crw.DrFH 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\87c609897feb7e9c.tmp 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\87c609897feb7e9c.tmp 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Wine 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{372A2DAD-EB6F-4A2A-A17F-5F1C4A8D07C2}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0A19D899-CA65-4778-8F2F-ECDA79F699C9}.catalogItem svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File created C:\Program Files (x86)\DECRYPT-FILES.txt 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files (x86)\87c609897feb7e9c.tmp 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\BackupExport.jpeg 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\LockComplete.jpg 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\SearchReceive.potm 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\DenyRepair.wvx 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\MergeUnlock.mpeg2 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\RequestPing.mp3 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\EditGet.eprtx 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\ExpandComplete.aif 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\SaveOpen.3gpp 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\StartRename.xlsb 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\WriteRestart.xlsm 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File created C:\Program Files\DECRYPT-FILES.txt 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\87c609897feb7e9c.tmp 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\AssertResize.001 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\RegisterApprove.mpeg3 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\SaveGrant.vsx 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\SelectConvert.lock 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\UnlockConnect.tif 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\ApproveImport.xls 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\JoinImport.m4v 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe File opened for modification C:\Program Files\RedoStart.png 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeBackupPrivilege 2808 vssvc.exe Token: SeRestorePrivilege 2808 vssvc.exe Token: SeAuditPrivilege 2808 vssvc.exe Token: SeIncreaseQuotaPrivilege 4228 wmic.exe Token: SeSecurityPrivilege 4228 wmic.exe Token: SeTakeOwnershipPrivilege 4228 wmic.exe Token: SeLoadDriverPrivilege 4228 wmic.exe Token: SeSystemProfilePrivilege 4228 wmic.exe Token: SeSystemtimePrivilege 4228 wmic.exe Token: SeProfSingleProcessPrivilege 4228 wmic.exe Token: SeIncBasePriorityPrivilege 4228 wmic.exe Token: SeCreatePagefilePrivilege 4228 wmic.exe Token: SeBackupPrivilege 4228 wmic.exe Token: SeRestorePrivilege 4228 wmic.exe Token: SeShutdownPrivilege 4228 wmic.exe Token: SeDebugPrivilege 4228 wmic.exe Token: SeSystemEnvironmentPrivilege 4228 wmic.exe Token: SeRemoteShutdownPrivilege 4228 wmic.exe Token: SeUndockPrivilege 4228 wmic.exe Token: SeManageVolumePrivilege 4228 wmic.exe Token: 33 4228 wmic.exe Token: 34 4228 wmic.exe Token: 35 4228 wmic.exe Token: 36 4228 wmic.exe Token: SeIncreaseQuotaPrivilege 4228 wmic.exe Token: SeSecurityPrivilege 4228 wmic.exe Token: SeTakeOwnershipPrivilege 4228 wmic.exe Token: SeLoadDriverPrivilege 4228 wmic.exe Token: SeSystemProfilePrivilege 4228 wmic.exe Token: SeSystemtimePrivilege 4228 wmic.exe Token: SeProfSingleProcessPrivilege 4228 wmic.exe Token: SeIncBasePriorityPrivilege 4228 wmic.exe Token: SeCreatePagefilePrivilege 4228 wmic.exe Token: SeBackupPrivilege 4228 wmic.exe Token: SeRestorePrivilege 4228 wmic.exe Token: SeShutdownPrivilege 4228 wmic.exe Token: SeDebugPrivilege 4228 wmic.exe Token: SeSystemEnvironmentPrivilege 4228 wmic.exe Token: SeRemoteShutdownPrivilege 4228 wmic.exe Token: SeUndockPrivilege 4228 wmic.exe Token: SeManageVolumePrivilege 4228 wmic.exe Token: 33 4228 wmic.exe Token: 34 4228 wmic.exe Token: 35 4228 wmic.exe Token: 36 4228 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4336 wrote to memory of 4228 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe 91 PID 4336 wrote to memory of 4228 4336 38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe"C:\Users\Admin\AppData\Local\Temp\38cc87cc48cdb89a2ab1ffaa0897c10ba4a26ff645f16d9cd5a8bc8debf255c6.exe"1⤵
- Modifies extensions of user files
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\wbem\wmic.exe"C:\v\..\Windows\u\gerj\..\..\system32\gef\sob\chr\..\..\..\wbem\yp\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1724