Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2023 12:26
Static task
static1
Behavioral task
behavioral1
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
Resource
win10v2004-20220901-en
General
-
Target
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe
-
Size
453KB
-
MD5
248c960c1ae54103dea5bfae924f28e2
-
SHA1
504ce8efee0f7f8329c09c6d045a21c795a84b42
-
SHA256
3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363
-
SHA512
5b3dd4be33c48cedda5b9270a6454540e837e9611db4d43b35e7290ff7e25dd3b5c0342de6de38f12e8c7d5f291c62ef026236825134d1181e7ba5bdf8103464
-
SSDEEP
6144:/P2vVfY9RbTrI5Tm6oUAcEtKY/e8lmceEoAE77OvaHhdRwc9/P2wdAn7gJRKKRqX:aVw9prIVpb3F8ltQlBwc9/P2l7gT6
Malware Config
Extracted
C:\DECRYPT-FILES.html
<b>[email protected]</b>
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EditRequest.png => C:\Users\Admin\Pictures\EditRequest.png.LQ4CxCB 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\GroupMeasure.crw => C:\Users\Admin\Pictures\GroupMeasure.crw.LQ4CxCB 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\JoinSave.raw => C:\Users\Admin\Pictures\JoinSave.raw.LQ4CxCB 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\Pictures\MountClear.tiff 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\RenameUnlock.crw => C:\Users\Admin\Pictures\RenameUnlock.crw.AAVCo 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\BackupSplit.tif => C:\Users\Admin\Pictures\BackupSplit.tif.wWdUwtK 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\CompleteEnable.raw => C:\Users\Admin\Pictures\CompleteEnable.raw.wWdUwtK 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\DisconnectEdit.tiff => C:\Users\Admin\Pictures\DisconnectEdit.tiff.LQ4CxCB 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\Pictures\DisconnectEdit.tiff 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File renamed C:\Users\Admin\Pictures\MountClear.tiff => C:\Users\Admin\Pictures\MountClear.tiff.LQ4CxCB 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.html 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\m6imsakp.dat 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.html 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\m6imsakp.dat 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\123456789.bmp" 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1100 wmic.exe Token: SeSecurityPrivilege 1100 wmic.exe Token: SeTakeOwnershipPrivilege 1100 wmic.exe Token: SeLoadDriverPrivilege 1100 wmic.exe Token: SeSystemProfilePrivilege 1100 wmic.exe Token: SeSystemtimePrivilege 1100 wmic.exe Token: SeProfSingleProcessPrivilege 1100 wmic.exe Token: SeIncBasePriorityPrivilege 1100 wmic.exe Token: SeCreatePagefilePrivilege 1100 wmic.exe Token: SeBackupPrivilege 1100 wmic.exe Token: SeRestorePrivilege 1100 wmic.exe Token: SeShutdownPrivilege 1100 wmic.exe Token: SeDebugPrivilege 1100 wmic.exe Token: SeSystemEnvironmentPrivilege 1100 wmic.exe Token: SeRemoteShutdownPrivilege 1100 wmic.exe Token: SeUndockPrivilege 1100 wmic.exe Token: SeManageVolumePrivilege 1100 wmic.exe Token: 33 1100 wmic.exe Token: 34 1100 wmic.exe Token: 35 1100 wmic.exe Token: 36 1100 wmic.exe Token: SeIncreaseQuotaPrivilege 1100 wmic.exe Token: SeSecurityPrivilege 1100 wmic.exe Token: SeTakeOwnershipPrivilege 1100 wmic.exe Token: SeLoadDriverPrivilege 1100 wmic.exe Token: SeSystemProfilePrivilege 1100 wmic.exe Token: SeSystemtimePrivilege 1100 wmic.exe Token: SeProfSingleProcessPrivilege 1100 wmic.exe Token: SeIncBasePriorityPrivilege 1100 wmic.exe Token: SeCreatePagefilePrivilege 1100 wmic.exe Token: SeBackupPrivilege 1100 wmic.exe Token: SeRestorePrivilege 1100 wmic.exe Token: SeShutdownPrivilege 1100 wmic.exe Token: SeDebugPrivilege 1100 wmic.exe Token: SeSystemEnvironmentPrivilege 1100 wmic.exe Token: SeRemoteShutdownPrivilege 1100 wmic.exe Token: SeUndockPrivilege 1100 wmic.exe Token: SeManageVolumePrivilege 1100 wmic.exe Token: 33 1100 wmic.exe Token: 34 1100 wmic.exe Token: 35 1100 wmic.exe Token: 36 1100 wmic.exe Token: SeBackupPrivilege 2828 vssvc.exe Token: SeRestorePrivilege 2828 vssvc.exe Token: SeAuditPrivilege 2828 vssvc.exe Token: SeIncreaseQuotaPrivilege 4788 wmic.exe Token: SeSecurityPrivilege 4788 wmic.exe Token: SeTakeOwnershipPrivilege 4788 wmic.exe Token: SeLoadDriverPrivilege 4788 wmic.exe Token: SeSystemProfilePrivilege 4788 wmic.exe Token: SeSystemtimePrivilege 4788 wmic.exe Token: SeProfSingleProcessPrivilege 4788 wmic.exe Token: SeIncBasePriorityPrivilege 4788 wmic.exe Token: SeCreatePagefilePrivilege 4788 wmic.exe Token: SeBackupPrivilege 4788 wmic.exe Token: SeRestorePrivilege 4788 wmic.exe Token: SeShutdownPrivilege 4788 wmic.exe Token: SeDebugPrivilege 4788 wmic.exe Token: SeSystemEnvironmentPrivilege 4788 wmic.exe Token: SeRemoteShutdownPrivilege 4788 wmic.exe Token: SeUndockPrivilege 4788 wmic.exe Token: SeManageVolumePrivilege 4788 wmic.exe Token: 33 4788 wmic.exe Token: 34 4788 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1100 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 90 PID 2404 wrote to memory of 1100 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 90 PID 2404 wrote to memory of 4788 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 96 PID 2404 wrote to memory of 4788 2404 3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe"C:\Users\Admin\AppData\Local\Temp\3885589a3c94d0475a6d994e4644e682f4cff93f8b4d65f37508ffe706861363.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\wbem\wmic.exe"C:\v\yu\f\..\..\..\Windows\ajm\ipmuh\hqtts\..\..\..\system32\v\..\wbem\gcdb\kyfur\xqm\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\system32\wbem\wmic.exe"C:\jkjce\cqig\o\..\..\..\Windows\gylte\rv\..\..\system32\fs\sulk\fcxh\..\..\..\wbem\s\kfhhs\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x1501⤵PID:764