Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 07:19

General

  • Target

    Device/HarddiskVolume3/Users/User1/Desktop/LetsDefend/SOC104 - Malware Detected/e8a091a84dd2ea7ee429.exe

  • Size

    473KB

  • MD5

    f83fb9ce6a83da58b20685c1d7e1e546

  • SHA1

    01c459b549c1c2a68208d38d4ba5e36d29212a4f

  • SHA256

    e8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684

  • SHA512

    934ec9073a28b90e8df785bef49f224789da59f83729208b92dba0503e2894b3f48ed04b20de1ba49374b1cd26f0c87e8e5ab79e817258135e3be2c171f3f396

  • SSDEEP

    12288:v6l/7FpnaeoQbRLBYdunMCayql4YcQD+AgJbAWgjbgpQ:CDna43YAKl4Yci+AggEpQ

Malware Config

Extracted

Path

C:\odt\DECRYPT-FILES.html

Ransom Note
<html> <head> <script> function CopyToClipboard(containerid) { if (document.selection) { var range = document.body.createTextRange(); range.moveToElementText(document.getElementById(containerid)); range.select().createTextRange(); document.execCommand("copy"); } else if (window.getSelection) { var range = document.createRange(); range.selectNode(document.getElementById(containerid)); window.getSelection().addRange(range); document.execCommand("copy"); alert("Base64 copied into the clipboard!") } } </script> <style> html{ margin:0; padding:0; width:100%; height:100%; } body { background: #000000; color: #ececec; font-family: Consolas }; .tooltip { position: relative; display: inline-block; border-bottom: 1px dotted black; } .tooltip .tooltiptext { visibility: hidden; width: 120px; background-color: #555; color: #fff; text-align: center; border-radius: 6px; padding: 5 px 0; position: absolute; z-index: 1; bottom: 125%; left: 50%; margin-left: -60px; opacity: 0; transition: opacity 0.3s; } .tooltip .tooltiptext::after { content: ""; position: absolute; top: 100%; left: 50%; margin-left: -5px; border-width: 5px; border-style: solid; border-color: #555 transparent transparent transparent; } .tooltip:hover .tooltiptext { visibility: visible; opacity: 1; } p#base64{ -ms-word-break: break-all; word-break: break-all; -webkit-hyphens: auto; -moz-hyphens: auto; -ms-hyphens: auto; hyphens: auto; } p#base64:hover{ cursor: hand; } </style> </head> <body> <table style="position: absolute;" width="100%"> <tr> <td style="width: 25%;"> <td style="width: 50%;"> <div style="text-align: center; font-size: 20px;"> <p><b>Maze ransomware</b></p> <p>*********************************************************************************************************************</p> <p>Attention! Your documents, photos, databases, and other important files have been encrypted!</p> <p>*********************************************************************************************************************</p> </div> <div style="text-align: center; font-size: 18px;"> <p><b>What is going on?</b><br>Your files have been encrypted using strong reliable algorithms RSA-2048 and ChaCha20 with an unique private key for your system</p> <p>You can read more about this cryptosystem here: <a href=https://en.wikipedia.org/wiki/RSA_(cryptosystem)>https://en.wikipedia.org/wiki/RSA_(cryptosystem)</a></p> <p>The only way to recover (decrypt) your files is to buy decryptor with the unique private key</p> <p><u>Attention! Only we can recover your files! If someone tell you that he can do this, kindly ask him to proof!</u></p> <p>By us you can decrypt one of your files for free as a proof of work that we have the method to decrypt the rest of your data.</p> <p>In order to either buy the private key or make test decryption contact us via email: <br> <u><b>Main e-mail: [email protected]<br>Reserve e-mail: [email protected]</b></u> <p>Remember to hurry up as email address may not be available for very long as soon as law enforcements of different countries always trying to seize emails used in ransom companies <p>If you are willing to pay but you are not sure knock us and we will save your e-mail address. In case the listed addresses are seized we will write you from the new one</p> <p>Below you will see a big base64 blob, you will need to email us and copy this blob to us.<br>you can click on it, and it will be copied into the clipboard.</p> <p>If you have troubles copying it, just send us the file you are currently reading, as an attachment.</p> <p>Base64: </p> </div><div style="text-align: center; font-size: 12px;"><p id="base64" onclick="return CopyToClipboard('base64')" class="tooltip">ll0jaA0MUYNY9f2/huwFZUvSXPkjXoAKw+2RjphBlA3WdTA/Ti/xkQBtXJBFQiQGIIvwkNbNFExfmJlhTUgsBs6BgZvJyoBwcN1LXLcJAxQUkf1RM8a4zBXFpHwSW21McK6JJAH1IRDo6mw2THVAxWwM0te79PJvlbYFhWgXS+uzABYYOQMNtxY8rpdLhSiPw/88Hmk+oMlWCmeTI2ASiotiY0a19cV//4CCtastAWn4E7GAO01l/DAfdsptKco/IFlppFKiK9kJv0JUdXZVPATcLJy8d9l0dLKv2j8nmdQ7p1X1BPx7yELOPRhbLExSiSL9w/VqNHVMDytGJb4H4HfpXIXmNL+/Dtq5IQRU+NOrhaORHyDWKdp24YHOy9uDpgC9b689jl9WmE+pdMIuqK0vI5qEPZ522Mat+XUSE3IB3ceuxFV8FShT4FjKvZXK+BR45rUgDUMvtlkv9vCUscp/w7ydHuQV8E2eFkfGLudcM2+4O7gmM7QFwaxvAfydoqqemPxC7SvydEmBOqi2Tl4F0K4og1nb7gOESBA0Iw7y/ENIM7nSlCNv6BFSD8I46eaQELnOBTqAA5H7iBYt+bzWL/angNVvvoWh/KBsvDV8TpJ0ewkGZ7rsPRABHDExGsfOcZqG/xR88jZz1iH+nPCuSloPZS6SwHxG2s2xPvFskixBdKpnKRSJedQ6gcLfFUikupRI0Nmlpc/E+CieIzMmSronjgz8iFn3zqJN4HzMkuIWa1pPlajUcYMub5asQcFK8WXuefAsxRTrXrTvAEjxS/yR7eDHYwTNgdz76ZQmU44JY/vRvoyHhO8pIQdtqadQ8iTCsPjye74RkMyYLYDMJo5sDFJWrxtH++aL9//dVZYBpdXOMx5YMHG4EXYG+DlZzkw4sbWUXpmHjSuS++wOeZALEgYvRXvHyJqthIvJPuaJ/avT62ORCEdpevqolwH0LBkLHlFbJL/Ghqy3VrjQpAlc1/Dbam90udCnPoYqOR1vgtgdvc54P8tmB2XzJ6PUZa2f+wVn802JNZxL9gV/FmIkS/A0MDF4iCLrGsSKjxX2qMWef3nvZLFuvqiAOL94eLC55B9Q10ZlVlIqYBc5Wwe1tuP6rjW+qTFnFBujf2HRCBlowiM27bwcHp2adNC/6zQjDDsqbanOXYtkXV3PWOe3guHlghuMT4PZcGDLOSZfcF0fSia2sFFCDzbCEy3DpMMWf3eoMDET2NLWiRyDsbSYdbGYZIb1SBSpPIOlvM1cFrwlUShohU648VcF/5SQJFUUvYkjh/nLnB2g0AomSsigxTEbClmWhY6vExLjZjamvJPClP2saBnExDjhfKPMKBcKcXT2W9pTTPhnIRdpzN8SrG1sioiSa+lSuoEPoQaS5v7vQ3lzoxomZcBVdTZwpJJxpijJVjVmMWiyJUCEh+wKOgMd23VXBunp8t0uc8zB4XoeZfPFutk3oU6M6/xSq08q+5smbC4Zxz8B4yPwyjysLaUenBSf0xsfnGFRoXqfXMJH0RIAlkM6Kcs43OLpwPNSWvL4+kl5UeOrRbQVN4a/E0kxhzYUgPyc6qi5A89l9Lcd0MKhPScbdackVAAJEDcFoqHssYuCoMDLYfZv5bsbpnrHwLkXnmlKwyy+ayjIOolpOfIbtCv4lFJHerw+wAmvlIBFCyTnEfAxXSLxQQlFWquhCnGW8GUoo9mDng0+6JVw+hNNNd5Go2FwSLY2kwvI/Uh3OmxnqWD+q7KDHmFu/9+AHTKskmJn8nGwloAGYrHk7yMGyYDT9xSQPk1Rb7H9j2ZHcPPc2mrVHP+QmBQHLC6MqjFmbkbqcDwY734UINwqKUw7tLykGtkdYrS9QpTqnK0NnnDHlfxgOX89IBwsjVO6lWhePrEK7PLJtxRt7Uu3//xefH1X5x/3l50TdgX41WsacaALNlrO1XTidCrhtChxTd+MR0TL9qW7Hl5qmw7sIVYfUH5f8+R9N9EufCYhAzEwXowq3L9vBUuJpwWTkWDjkuAjV6TZxmAwOthEgnJhOrbTZlsXCwzcyS/W0EbQ5eRn3BoS1orKVNS8Ca3Py03mbhB2saxD5SaMmKqVvWdg5rng/tyDgll8C1iaPH1QDN8vNwUw037/oPmv5uAG12gLfp8neQiGGJG2kUzzAu/fcD7jWT9EKEEeHLQTOIqzLmszuTntMf+6PbbG3MAM12HCisU41WXZ6jaiB9wLIr8LcXYd9apDXV6HUW26EgoiOAA3AGUAMAAwADkAOABiADkAOABjADEAOQA2ADUAYgAAABCAYBoMQQBkAG0AaQBuAAAAIhJFAFkASABSAEQAUABUAEcAAAAqDG4AbwBuAGUAfAAAADIsVwBpAG4AZABvAHcAcwAgADEAMAAgAEUAbgB0AGUAcgBwAHIAaQBzAGUAAABCVnwAQwBfAEYAXwAyADAANAA3ADkALwAyADQAMQAzADYAMQB8AEQAXwBVAF8AMAAvADAAfABGAF8ARgBfADIAMAA0ADIAMQAvADIAMAA0ADcAOQB8AAAASABQQFiJCGCJCGiJCHCh8d5yeAOAAQKKAQUxLjAuMg==<span class="tooltiptext">Click here to copy</span></p></div></td><td style="width: 25%; text-align: right;"></tr></table></body></html>
Emails

[email protected]<br>Reserve

[email protected]</b></u>

Signatures

  • Maze

    Ransomware family also known as ChaCha.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\User1\Desktop\LetsDefend\SOC104 - Malware Detected\e8a091a84dd2ea7ee429.exe
    "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\User1\Desktop\LetsDefend\SOC104 - Malware Detected\e8a091a84dd2ea7ee429.exe"
    1⤵
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\system32\wbem\wmic.exe
      "C:\vk\cae\..\..\Windows\x\koixe\..\..\system32\x\hsjp\..\..\wbem\kheun\t\..\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5068
    • C:\Windows\system32\wbem\wmic.exe
      "C:\rn\jvqo\..\..\Windows\ak\nic\..\..\system32\sd\hiw\iyhqx\..\..\..\wbem\cqo\..\wmic.exe" shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5116
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3976
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x428 0x3c4
    1⤵
      PID:296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_8AD9A27CC2254E908C038111CA8CC7BA.dat

      Filesize

      940B

      MD5

      135f1df56064a8e8b268aae172a7d699

      SHA1

      4a896d2dd481fe2213538b7b0070a2c70fe6cbf4

      SHA256

      9368607a408690b980f6e1ac7433cb1a8103ba4d63c07bd2ab2cd0698e6fe830

      SHA512

      6ebab5cd0a4d28c7a6efffb1c803d8bc0cfce8cb36e3311d8b6b0990d5a84770ee1347c8698f0de924a65b11163a196590385953089c3a4b3936b1711819e558

    • C:\odt\DECRYPT-FILES.html

      Filesize

      6KB

      MD5

      0ec438c9270c3ddadcba63f40fe2aed7

      SHA1

      ff4be8b19284b99e1946640d45d208b120a1c113

      SHA256

      3b9b70f3ad697bd80d96847edd4acd4911dd7ed0222f47d3af2b1adcddda4a80

      SHA512

      753ff69ca591b49ea2c4c4980c8ccf8d43034629a7181a9fd04566f051152af96e5f5104b0cce8b9b94a32c3a162d46edaca4831b5ede1c5c1fbaf038598508e

    • memory/2492-0-0x00000000031F0000-0x0000000003249000-memory.dmp

      Filesize

      356KB

    • memory/2492-1-0x0000000003390000-0x00000000033EB000-memory.dmp

      Filesize

      364KB

    • memory/2492-5-0x0000000003390000-0x00000000033EB000-memory.dmp

      Filesize

      364KB

    • memory/2492-9-0x0000000003390000-0x00000000033EB000-memory.dmp

      Filesize

      364KB

    • memory/2492-13-0x0000000003390000-0x00000000033EB000-memory.dmp

      Filesize

      364KB

    • memory/2492-5385-0x0000000003390000-0x00000000033EB000-memory.dmp

      Filesize

      364KB