Analysis
-
max time kernel
72s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Maze.exe
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Maze.exe
Resource
win10v2004-20230220-en
10 signatures
150 seconds
General
-
Target
Maze.exe
-
Size
405KB
-
MD5
90f6964889e76843cf42c4284db3d245
-
SHA1
3ba802e59f48b3f6dae1c237edd5d41848be10e0
-
SHA256
5f8b29e7c8f8bfa78b685c3a572b69dffbc52c0581b7872fe2166b2860a7ba19
-
SHA512
910cd47e05ca2c5bd573851d738942f9735536c73ac459c499bdd96c20ca3320a23584e643ac69d104154632dde2ddd786ffca05ce8e41b9ad4fc2e4f6c77bc1
-
SSDEEP
6144:sdjiklFfy93i6eT7Wu1AbseZkGGSAldub9Q+hKw:8ikbfy93i6C71GES0E
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 864 created 592 864 Maze.exe 3 -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Maze.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Maze.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 864 set thread context of 1436 864 Maze.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 864 Maze.exe 864 Maze.exe 1436 dllhost.exe 1436 dllhost.exe 1436 dllhost.exe 1436 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 864 Maze.exe Token: SeDebugPrivilege 864 Maze.exe Token: SeDebugPrivilege 1436 dllhost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 864 wrote to memory of 1436 864 Maze.exe 98 PID 1436 wrote to memory of 592 1436 dllhost.exe 3 PID 1436 wrote to memory of 672 1436 dllhost.exe 1 PID 1436 wrote to memory of 960 1436 dllhost.exe 25 PID 1436 wrote to memory of 60 1436 dllhost.exe 9 PID 1436 wrote to memory of 516 1436 dllhost.exe 10 PID 1436 wrote to memory of 868 1436 dllhost.exe 24 PID 1436 wrote to memory of 1060 1436 dllhost.exe 22 PID 1436 wrote to memory of 1068 1436 dllhost.exe 21 PID 1436 wrote to memory of 1132 1436 dllhost.exe 11 PID 1436 wrote to memory of 1188 1436 dllhost.exe 19 PID 1436 wrote to memory of 1236 1436 dllhost.exe 18 PID 1436 wrote to memory of 1276 1436 dllhost.exe 12 PID 1436 wrote to memory of 1296 1436 dllhost.exe 17 PID 1436 wrote to memory of 1428 1436 dllhost.exe 15 PID 1436 wrote to memory of 1456 1436 dllhost.exe 13
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:592
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{04801821-230d-41a3-a988-8d2fb02eba34}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1188
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\Maze.exe"C:\Users\Admin\AppData\Local\Temp\Maze.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Disables RegEdit via registry modification
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864