Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 18:42
Static task
static1
Behavioral task
behavioral1
Sample
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251.dll
Resource
win10v2004-20220812-en
General
-
Target
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251.dll
-
Size
733KB
-
MD5
460cb38e14fcadef06e267047ce9d69e
-
SHA1
b5f99fc2edba2891b6d947aacd3c32be5b43ba4c
-
SHA256
6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251
-
SHA512
312cdb07d8b4c278d0afd8de73bfa276cffa2980005ca519cff1f7c06ce8ad4811f4ae791b861d1caa6e2891615eb963800977f2efb739a04b7c54107de1d7f1
-
SSDEEP
12288:k5/glZ0FL3v6n2KwlrIf8U1UaqPDcGr+UJZj4vKHdyicKK6:OglOF763Kq8U1U3eixExM
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b370c9f9ae8a9b6
https://mazedecrypt.top/6b370c9f9ae8a9b6
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\InstallResume.png => C:\Users\Admin\Pictures\InstallResume.png.ugvzV regsvr32.exe File renamed C:\Users\Admin\Pictures\OptimizeExpand.png => C:\Users\Admin\Pictures\OptimizeExpand.png.oIGWyz regsvr32.exe File renamed C:\Users\Admin\Pictures\UninstallUse.tif => C:\Users\Admin\Pictures\UninstallUse.tif.MqcJ5T regsvr32.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b370c9f9ae8a9b6.tmp regsvr32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b370c9f9ae8a9b6.tmp regsvr32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\111.bmp" regsvr32.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File opened for modification C:\Program Files\CompressUnpublish.ram regsvr32.exe File opened for modification C:\Program Files\DisableConvert.temp regsvr32.exe File opened for modification C:\Program Files\SyncExport.3gpp regsvr32.exe File opened for modification C:\Program Files\UninstallWrite.xps regsvr32.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt regsvr32.exe File created C:\Program Files\DECRYPT-FILES.txt regsvr32.exe File opened for modification C:\Program Files\AssertEdit.temp regsvr32.exe File opened for modification C:\Program Files\CompareUninstall.ram regsvr32.exe File opened for modification C:\Program Files\RestoreSet.AAC regsvr32.exe File opened for modification C:\Program Files\SelectUse.sql regsvr32.exe File opened for modification C:\Program Files\WaitOptimize.sql regsvr32.exe File opened for modification C:\Program Files\6b370c9f9ae8a9b6.tmp regsvr32.exe File opened for modification C:\Program Files\CheckpointPop.png regsvr32.exe File opened for modification C:\Program Files (x86)\6b370c9f9ae8a9b6.tmp regsvr32.exe File opened for modification C:\Program Files\StopApprove.temp regsvr32.exe File opened for modification C:\Program Files\UndoPush.mpe regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4596 regsvr32.exe 4596 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeBackupPrivilege 1052 vssvc.exe Token: SeRestorePrivilege 1052 vssvc.exe Token: SeAuditPrivilege 1052 vssvc.exe Token: SeIncreaseQuotaPrivilege 2636 wmic.exe Token: SeSecurityPrivilege 2636 wmic.exe Token: SeTakeOwnershipPrivilege 2636 wmic.exe Token: SeLoadDriverPrivilege 2636 wmic.exe Token: SeSystemProfilePrivilege 2636 wmic.exe Token: SeSystemtimePrivilege 2636 wmic.exe Token: SeProfSingleProcessPrivilege 2636 wmic.exe Token: SeIncBasePriorityPrivilege 2636 wmic.exe Token: SeCreatePagefilePrivilege 2636 wmic.exe Token: SeBackupPrivilege 2636 wmic.exe Token: SeRestorePrivilege 2636 wmic.exe Token: SeShutdownPrivilege 2636 wmic.exe Token: SeDebugPrivilege 2636 wmic.exe Token: SeSystemEnvironmentPrivilege 2636 wmic.exe Token: SeRemoteShutdownPrivilege 2636 wmic.exe Token: SeUndockPrivilege 2636 wmic.exe Token: SeManageVolumePrivilege 2636 wmic.exe Token: 33 2636 wmic.exe Token: 34 2636 wmic.exe Token: 35 2636 wmic.exe Token: 36 2636 wmic.exe Token: SeIncreaseQuotaPrivilege 2636 wmic.exe Token: SeSecurityPrivilege 2636 wmic.exe Token: SeTakeOwnershipPrivilege 2636 wmic.exe Token: SeLoadDriverPrivilege 2636 wmic.exe Token: SeSystemProfilePrivilege 2636 wmic.exe Token: SeSystemtimePrivilege 2636 wmic.exe Token: SeProfSingleProcessPrivilege 2636 wmic.exe Token: SeIncBasePriorityPrivilege 2636 wmic.exe Token: SeCreatePagefilePrivilege 2636 wmic.exe Token: SeBackupPrivilege 2636 wmic.exe Token: SeRestorePrivilege 2636 wmic.exe Token: SeShutdownPrivilege 2636 wmic.exe Token: SeDebugPrivilege 2636 wmic.exe Token: SeSystemEnvironmentPrivilege 2636 wmic.exe Token: SeRemoteShutdownPrivilege 2636 wmic.exe Token: SeUndockPrivilege 2636 wmic.exe Token: SeManageVolumePrivilege 2636 wmic.exe Token: 33 2636 wmic.exe Token: 34 2636 wmic.exe Token: 35 2636 wmic.exe Token: 36 2636 wmic.exe Token: 33 320 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 320 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4596 5036 regsvr32.exe 82 PID 5036 wrote to memory of 4596 5036 regsvr32.exe 82 PID 5036 wrote to memory of 4596 5036 regsvr32.exe 82 PID 4596 wrote to memory of 2636 4596 regsvr32.exe 86 PID 4596 wrote to memory of 2636 4596 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251.dll1⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6713403015feb8959093f5d007bcbdbb3be9eec96dd62f517786b67506067251.dll2⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\wbem\wmic.exe"C:\o\tg\..\..\Windows\t\f\vfv\..\..\..\system32\w\qo\..\..\wbem\q\..\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4041⤵
- Suspicious use of AdjustPrivilegeToken
PID:320