Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 12:57
Static task
static1
Behavioral task
behavioral1
Sample
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe
Resource
win10v2004-20230915-en
General
-
Target
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe
-
Size
478KB
-
MD5
deebbea18401e8b5e83c410c6d3a8b4e
-
SHA1
96d81e77b6af8f54a5ac07b2c613a5655dd05353
-
SHA256
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af
-
SHA512
a0396c82fb68cf3931f0a2fcdba580d51ec6069c82b4e3853341fc6971a4bde4dbeb0094b94379d1dce4b1d8c43703e86266156ecbee89f9c939a71cafe9d487
-
SSDEEP
12288:2GOrdqXg+Hy7WxHXkzYHD9Fg0CNDG+X9MOguRTzxH/F:EjuSWxHY0C5PXmOgEhN
Malware Config
Extracted
C:\Users\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/88a0099fc32db38
https://mazedecrypt.top/88a0099fc32db38
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Windows Defender anti-emulation file check 1 TTPs 1 IoCs
Defender's emulator always creates certain fake files which can be used to detect it.
Processes:
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exedescription ioc Process File opened (read-only) C:\aaa_TouchMeNot_.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe -
Drops startup file 2 IoCs
Processes:
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 29 IoCs
Processes:
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exedescription ioc Process File opened for modification C:\Program Files\PushInvoke.cab 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\RenameUnprotect.m4v 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\StepUnprotect.m1v 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\JoinDisable.cfg 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\MoveSkip.wav 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\UpdateJoin.mov 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File created C:\Program Files\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\SubmitCompare.mp2v 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\MoveSubmit.xps 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\SaveSet.wpl 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\UninstallLimit.mpeg 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\SplitMerge.mpg 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files (x86)\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\ExportWrite.htm 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\MergeRestore.xsl 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\RemoveRename.docx 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\ResumeInitialize.mhtml 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\SwitchReset.wps 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\UndoLimit.m4a 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\InstallLimit.ttc 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files\RestoreReceive.pps 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sg6bwrs.tmp 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exepid Process 1820 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
vssvc.exewmic.exedescription pid Process Token: SeBackupPrivilege 2796 vssvc.exe Token: SeRestorePrivilege 2796 vssvc.exe Token: SeAuditPrivilege 2796 vssvc.exe Token: SeIncreaseQuotaPrivilege 2960 wmic.exe Token: SeSecurityPrivilege 2960 wmic.exe Token: SeTakeOwnershipPrivilege 2960 wmic.exe Token: SeLoadDriverPrivilege 2960 wmic.exe Token: SeSystemProfilePrivilege 2960 wmic.exe Token: SeSystemtimePrivilege 2960 wmic.exe Token: SeProfSingleProcessPrivilege 2960 wmic.exe Token: SeIncBasePriorityPrivilege 2960 wmic.exe Token: SeCreatePagefilePrivilege 2960 wmic.exe Token: SeBackupPrivilege 2960 wmic.exe Token: SeRestorePrivilege 2960 wmic.exe Token: SeShutdownPrivilege 2960 wmic.exe Token: SeDebugPrivilege 2960 wmic.exe Token: SeSystemEnvironmentPrivilege 2960 wmic.exe Token: SeRemoteShutdownPrivilege 2960 wmic.exe Token: SeUndockPrivilege 2960 wmic.exe Token: SeManageVolumePrivilege 2960 wmic.exe Token: 33 2960 wmic.exe Token: 34 2960 wmic.exe Token: 35 2960 wmic.exe Token: SeIncreaseQuotaPrivilege 2960 wmic.exe Token: SeSecurityPrivilege 2960 wmic.exe Token: SeTakeOwnershipPrivilege 2960 wmic.exe Token: SeLoadDriverPrivilege 2960 wmic.exe Token: SeSystemProfilePrivilege 2960 wmic.exe Token: SeSystemtimePrivilege 2960 wmic.exe Token: SeProfSingleProcessPrivilege 2960 wmic.exe Token: SeIncBasePriorityPrivilege 2960 wmic.exe Token: SeCreatePagefilePrivilege 2960 wmic.exe Token: SeBackupPrivilege 2960 wmic.exe Token: SeRestorePrivilege 2960 wmic.exe Token: SeShutdownPrivilege 2960 wmic.exe Token: SeDebugPrivilege 2960 wmic.exe Token: SeSystemEnvironmentPrivilege 2960 wmic.exe Token: SeRemoteShutdownPrivilege 2960 wmic.exe Token: SeUndockPrivilege 2960 wmic.exe Token: SeManageVolumePrivilege 2960 wmic.exe Token: 33 2960 wmic.exe Token: 34 2960 wmic.exe Token: 35 2960 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exedescription pid Process procid_target PID 1820 wrote to memory of 2960 1820 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe 35 PID 1820 wrote to memory of 2960 1820 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe 35 PID 1820 wrote to memory of 2960 1820 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe 35 PID 1820 wrote to memory of 2960 1820 6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe 35 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe"C:\Users\Admin\AppData\Local\Temp\6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af.exe"1⤵
- Windows Defender anti-emulation file check
- Drops startup file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\wbem\wmic.exe"C:\wfvdb\..\Windows\u\..\system32\ne\..\wbem\svul\xjic\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD566ef1014cc66a5f28bac3edc38b37238
SHA1ca57d5eabe24a903ccbf53b216b45dfac8e384d3
SHA256805040519533462a8f0e1016371aaafd6422d9c15ce4494726a0738e9cf998e6
SHA5122ee58e756191e170747d0ffd26a09a823153961d9b63da86869ba69be18611fb404c259a89d468093063f5688abb01c657b09d07f5c6aea05c91ed6e82de38f1