Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 13:36
Static task
static1
Behavioral task
behavioral1
Sample
wordupd.exe
Resource
win7-20220414-en
General
-
Target
wordupd.exe
-
Size
736KB
-
MD5
21a563f958b73d453ad91e251b11855c
-
SHA1
64ed4f6b315448d518ed003a1d0c7e56790ef50d
-
SHA256
067f1b8f1e0b2bfe286f5169e17834e8cf7f4266b8d97f28ea78995dc81b0e7b
-
SHA512
3eaef227db10759c65d668317322e71cd60e60427afd4d4f5f627e9b7a9d4e6d3287b7bf32df3fa7ba2f7062ec41393a100a477668b7f4dca76c2b8932c1b9eb
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/89ba09ba7e010201
https://mazedecrypt.top/89ba09ba7e010201
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
suricata: ET MALWARE Maze/ID Ransomware Activity
suricata: ET MALWARE Maze/ID Ransomware Activity
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
wordupd.exedescription ioc Process File renamed C:\Users\Admin\Pictures\UndoUpdate.tiff => C:\Users\Admin\Pictures\UndoUpdate.tiff.d8zv wordupd.exe File opened for modification C:\Users\Admin\Pictures\UseUnblock.tiff wordupd.exe File renamed C:\Users\Admin\Pictures\WatchPing.crw => C:\Users\Admin\Pictures\WatchPing.crw.d8zv wordupd.exe File renamed C:\Users\Admin\Pictures\BlockResume.crw => C:\Users\Admin\Pictures\BlockResume.crw.BYm2 wordupd.exe File opened for modification C:\Users\Admin\Pictures\UndoUpdate.tiff wordupd.exe File renamed C:\Users\Admin\Pictures\ReceiveInvoke.tif => C:\Users\Admin\Pictures\ReceiveInvoke.tif.q9Di wordupd.exe File renamed C:\Users\Admin\Pictures\SuspendCompare.crw => C:\Users\Admin\Pictures\SuspendCompare.crw.q9Di wordupd.exe File renamed C:\Users\Admin\Pictures\UseUnblock.tiff => C:\Users\Admin\Pictures\UseUnblock.tiff.d8zv wordupd.exe File opened for modification C:\Users\Admin\Pictures\AssertJoin.tiff wordupd.exe File renamed C:\Users\Admin\Pictures\ConfirmTest.raw => C:\Users\Admin\Pictures\ConfirmTest.raw.BYm2 wordupd.exe File renamed C:\Users\Admin\Pictures\AssertJoin.tiff => C:\Users\Admin\Pictures\AssertJoin.tiff.BYm2 wordupd.exe File renamed C:\Users\Admin\Pictures\UnprotectClose.raw => C:\Users\Admin\Pictures\UnprotectClose.raw.d8zv wordupd.exe File renamed C:\Users\Admin\Pictures\CloseBackup.tif => C:\Users\Admin\Pictures\CloseBackup.tif.BYm2 wordupd.exe File renamed C:\Users\Admin\Pictures\CompleteUnprotect.png => C:\Users\Admin\Pictures\CompleteUnprotect.png.BYm2 wordupd.exe -
Drops startup file 4 IoCs
Processes:
wordupd.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\89ba09ba7e010201.tmp wordupd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\89ba09ba7e010201.tmp wordupd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 10 IoCs
Processes:
svchost.exedescription ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0AF88682-368F-4686-83A6-D5E92A110729}.catalogItem svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NXQXXLFST89.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{4EF9EFD2-CDEA-4408-B175-7D92A668238A}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5BA42EB9-661B-4478-B321-70599C7E94AD}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{E88895AA-D8DF-46BF-AF14-1A1D68B05FC2}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NXQXXLFST89.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{15B1774C-A2B8-499F-A26E-3683BC483FE9}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{61AC62B4-4B02-4CEE-BB32-CE661F25AB35}.catalogItem svchost.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
wordupd.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" wordupd.exe -
Drops file in Program Files directory 32 IoCs
Processes:
wordupd.exedescription ioc Process File opened for modification C:\Program Files\AddPop.AAC wordupd.exe File opened for modification C:\Program Files\BackupSubmit.ppt wordupd.exe File opened for modification C:\Program Files\UninstallSync.jpeg wordupd.exe File opened for modification C:\Program Files\UpdateMeasure.dib wordupd.exe File opened for modification C:\Program Files\WriteClose.iso wordupd.exe File opened for modification C:\Program Files\ConnectPop.xla wordupd.exe File opened for modification C:\Program Files\GrantConvertTo.mpp wordupd.exe File opened for modification C:\Program Files\GrantEnable.ogg wordupd.exe File opened for modification C:\Program Files\MeasureMove.wma wordupd.exe File opened for modification C:\Program Files\ResetDisable.rm wordupd.exe File opened for modification C:\Program Files\StepPush.mpv2 wordupd.exe File opened for modification C:\Program Files\89ba09ba7e010201.tmp wordupd.exe File opened for modification C:\Program Files\ConvertImport.wdp wordupd.exe File opened for modification C:\Program Files\DismountOut.tiff wordupd.exe File opened for modification C:\Program Files\FindUnlock.jpeg wordupd.exe File opened for modification C:\Program Files\OptimizeSearch.xml wordupd.exe File opened for modification C:\Program Files\PublishReceive.potx wordupd.exe File created C:\Program Files\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Program Files\CompressCompare.ppt wordupd.exe File opened for modification C:\Program Files\GetExport.svg wordupd.exe File opened for modification C:\Program Files\InitializeConvertTo.ex_ wordupd.exe File opened for modification C:\Program Files\PublishResume.png wordupd.exe File opened for modification C:\Program Files\RequestRedo.mpg wordupd.exe File opened for modification C:\Program Files\UnpublishStep.vbs wordupd.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt wordupd.exe File opened for modification C:\Program Files (x86)\89ba09ba7e010201.tmp wordupd.exe File opened for modification C:\Program Files\ResizeSubmit.3gpp wordupd.exe File opened for modification C:\Program Files\SendReceive.tmp wordupd.exe File opened for modification C:\Program Files\ShowEnter.pub wordupd.exe File opened for modification C:\Program Files\ExportUnblock.tif wordupd.exe File opened for modification C:\Program Files\StepMount.xlsx wordupd.exe File opened for modification C:\Program Files\TraceFormat.eprtx wordupd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wordupd.exepid Process 4200 wordupd.exe 4200 wordupd.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
vssvc.exewmic.exeAUDIODG.EXEAUDIODG.EXEdescription pid Process Token: SeBackupPrivilege 4628 vssvc.exe Token: SeRestorePrivilege 4628 vssvc.exe Token: SeAuditPrivilege 4628 vssvc.exe Token: SeIncreaseQuotaPrivilege 2516 wmic.exe Token: SeSecurityPrivilege 2516 wmic.exe Token: SeTakeOwnershipPrivilege 2516 wmic.exe Token: SeLoadDriverPrivilege 2516 wmic.exe Token: SeSystemProfilePrivilege 2516 wmic.exe Token: SeSystemtimePrivilege 2516 wmic.exe Token: SeProfSingleProcessPrivilege 2516 wmic.exe Token: SeIncBasePriorityPrivilege 2516 wmic.exe Token: SeCreatePagefilePrivilege 2516 wmic.exe Token: SeBackupPrivilege 2516 wmic.exe Token: SeRestorePrivilege 2516 wmic.exe Token: SeShutdownPrivilege 2516 wmic.exe Token: SeDebugPrivilege 2516 wmic.exe Token: SeSystemEnvironmentPrivilege 2516 wmic.exe Token: SeRemoteShutdownPrivilege 2516 wmic.exe Token: SeUndockPrivilege 2516 wmic.exe Token: SeManageVolumePrivilege 2516 wmic.exe Token: 33 2516 wmic.exe Token: 34 2516 wmic.exe Token: 35 2516 wmic.exe Token: 36 2516 wmic.exe Token: SeIncreaseQuotaPrivilege 2516 wmic.exe Token: SeSecurityPrivilege 2516 wmic.exe Token: SeTakeOwnershipPrivilege 2516 wmic.exe Token: SeLoadDriverPrivilege 2516 wmic.exe Token: SeSystemProfilePrivilege 2516 wmic.exe Token: SeSystemtimePrivilege 2516 wmic.exe Token: SeProfSingleProcessPrivilege 2516 wmic.exe Token: SeIncBasePriorityPrivilege 2516 wmic.exe Token: SeCreatePagefilePrivilege 2516 wmic.exe Token: SeBackupPrivilege 2516 wmic.exe Token: SeRestorePrivilege 2516 wmic.exe Token: SeShutdownPrivilege 2516 wmic.exe Token: SeDebugPrivilege 2516 wmic.exe Token: SeSystemEnvironmentPrivilege 2516 wmic.exe Token: SeRemoteShutdownPrivilege 2516 wmic.exe Token: SeUndockPrivilege 2516 wmic.exe Token: SeManageVolumePrivilege 2516 wmic.exe Token: 33 2516 wmic.exe Token: 34 2516 wmic.exe Token: 35 2516 wmic.exe Token: 36 2516 wmic.exe Token: 33 924 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 924 AUDIODG.EXE Token: 33 5076 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5076 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
wordupd.exedescription pid Process procid_target PID 4200 wrote to memory of 2516 4200 wordupd.exe 92 PID 4200 wrote to memory of 2516 4200 wordupd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\wordupd.exe"C:\Users\Admin\AppData\Local\Temp\wordupd.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\system32\wbem\wmic.exe"C:\inc\bhv\vtu\..\..\..\Windows\vqnpk\su\f\..\..\..\system32\ubt\r\f\..\..\..\wbem\fa\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:924
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:1240