Analysis
-
max time kernel
1429s -
max time network
1423s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
wordupd.exe
Resource
win7-20220414-en
General
-
Target
wordupd.exe
-
Size
736KB
-
MD5
21a563f958b73d453ad91e251b11855c
-
SHA1
64ed4f6b315448d518ed003a1d0c7e56790ef50d
-
SHA256
067f1b8f1e0b2bfe286f5169e17834e8cf7f4266b8d97f28ea78995dc81b0e7b
-
SHA512
3eaef227db10759c65d668317322e71cd60e60427afd4d4f5f627e9b7a9d4e6d3287b7bf32df3fa7ba2f7062ec41393a100a477668b7f4dca76c2b8932c1b9eb
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/889609ac71af7fdf
https://mazedecrypt.top/889609ac71af7fdf
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
suricata: ET MALWARE Maze/ID Ransomware Activity
suricata: ET MALWARE Maze/ID Ransomware Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SendSelect.png => C:\Users\Admin\Pictures\SendSelect.png.Th5u wordupd.exe File renamed C:\Users\Admin\Pictures\ShowRestore.png => C:\Users\Admin\Pictures\ShowRestore.png.Th5u wordupd.exe File renamed C:\Users\Admin\Pictures\TestConfirm.png => C:\Users\Admin\Pictures\TestConfirm.png.Th5u wordupd.exe File renamed C:\Users\Admin\Pictures\FindRedo.tif => C:\Users\Admin\Pictures\FindRedo.tif.mFM1mh wordupd.exe File renamed C:\Users\Admin\Pictures\JoinApprove.raw => C:\Users\Admin\Pictures\JoinApprove.raw.SyUuZ7 wordupd.exe File renamed C:\Users\Admin\Pictures\MoveGroup.tif => C:\Users\Admin\Pictures\MoveGroup.tif.W7D9LWH wordupd.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\889609ac71af7fdf.tmp wordupd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\889609ac71af7fdf.tmp wordupd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" wordupd.exe -
Drops file in Program Files directory 27 IoCs
description ioc Process File opened for modification C:\Program Files\EnableGrant.js wordupd.exe File opened for modification C:\Program Files\OutMeasure.jpg wordupd.exe File opened for modification C:\Program Files\PublishUse.txt wordupd.exe File opened for modification C:\Program Files\UndoUnpublish.js wordupd.exe File opened for modification C:\Program Files (x86)\889609ac71af7fdf.tmp wordupd.exe File opened for modification C:\Program Files\ApproveSubmit.tiff wordupd.exe File opened for modification C:\Program Files\DismountUnregister.mp3 wordupd.exe File opened for modification C:\Program Files\UnblockTest.dotx wordupd.exe File opened for modification C:\Program Files\DismountReset.midi wordupd.exe File opened for modification C:\Program Files\FormatTest.ttc wordupd.exe File opened for modification C:\Program Files\NewUnlock.xlsb wordupd.exe File opened for modification C:\Program Files\UnpublishSave.mpeg3 wordupd.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Program Files\CompareCompress.nfo wordupd.exe File opened for modification C:\Program Files\JoinAdd.potx wordupd.exe File opened for modification C:\Program Files\UseSwitch.xlsm wordupd.exe File opened for modification C:\Program Files\ProtectShow.txt wordupd.exe File opened for modification C:\Program Files\889609ac71af7fdf.tmp wordupd.exe File opened for modification C:\Program Files\UseStep.dwg wordupd.exe File opened for modification C:\Program Files\WatchComplete.htm wordupd.exe File created C:\Program Files\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Program Files\EnablePush.search-ms wordupd.exe File opened for modification C:\Program Files\PingSwitch.rmi wordupd.exe File opened for modification C:\Program Files\SelectRedo.cfg wordupd.exe File opened for modification C:\Program Files\FormatInvoke.i64 wordupd.exe File opened for modification C:\Program Files\SelectExport.WTV wordupd.exe File opened for modification C:\Program Files\StopUninstall.mhtml wordupd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4120 wordupd.exe 4120 wordupd.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeBackupPrivilege 4384 vssvc.exe Token: SeRestorePrivilege 4384 vssvc.exe Token: SeAuditPrivilege 4384 vssvc.exe Token: SeIncreaseQuotaPrivilege 5032 wmic.exe Token: SeSecurityPrivilege 5032 wmic.exe Token: SeTakeOwnershipPrivilege 5032 wmic.exe Token: SeLoadDriverPrivilege 5032 wmic.exe Token: SeSystemProfilePrivilege 5032 wmic.exe Token: SeSystemtimePrivilege 5032 wmic.exe Token: SeProfSingleProcessPrivilege 5032 wmic.exe Token: SeIncBasePriorityPrivilege 5032 wmic.exe Token: SeCreatePagefilePrivilege 5032 wmic.exe Token: SeBackupPrivilege 5032 wmic.exe Token: SeRestorePrivilege 5032 wmic.exe Token: SeShutdownPrivilege 5032 wmic.exe Token: SeDebugPrivilege 5032 wmic.exe Token: SeSystemEnvironmentPrivilege 5032 wmic.exe Token: SeRemoteShutdownPrivilege 5032 wmic.exe Token: SeUndockPrivilege 5032 wmic.exe Token: SeManageVolumePrivilege 5032 wmic.exe Token: 33 5032 wmic.exe Token: 34 5032 wmic.exe Token: 35 5032 wmic.exe Token: 36 5032 wmic.exe Token: SeIncreaseQuotaPrivilege 5032 wmic.exe Token: SeSecurityPrivilege 5032 wmic.exe Token: SeTakeOwnershipPrivilege 5032 wmic.exe Token: SeLoadDriverPrivilege 5032 wmic.exe Token: SeSystemProfilePrivilege 5032 wmic.exe Token: SeSystemtimePrivilege 5032 wmic.exe Token: SeProfSingleProcessPrivilege 5032 wmic.exe Token: SeIncBasePriorityPrivilege 5032 wmic.exe Token: SeCreatePagefilePrivilege 5032 wmic.exe Token: SeBackupPrivilege 5032 wmic.exe Token: SeRestorePrivilege 5032 wmic.exe Token: SeShutdownPrivilege 5032 wmic.exe Token: SeDebugPrivilege 5032 wmic.exe Token: SeSystemEnvironmentPrivilege 5032 wmic.exe Token: SeRemoteShutdownPrivilege 5032 wmic.exe Token: SeUndockPrivilege 5032 wmic.exe Token: SeManageVolumePrivilege 5032 wmic.exe Token: 33 5032 wmic.exe Token: 34 5032 wmic.exe Token: 35 5032 wmic.exe Token: 36 5032 wmic.exe Token: 33 1336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1336 AUDIODG.EXE Token: 33 3628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3628 AUDIODG.EXE Token: 33 4852 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4852 AUDIODG.EXE Token: 33 3800 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3800 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4120 wrote to memory of 5032 4120 wordupd.exe 93 PID 4120 wrote to memory of 5032 4120 wordupd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\wordupd.exe"C:\Users\Admin\AppData\Local\Temp\wordupd.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\wbem\wmic.exe"C:\dnce\..\Windows\nv\e\..\..\system32\hw\..\wbem\dyg\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x3101⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x3101⤵
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x3101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x3101⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800