Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
Maze.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Maze.exe
Resource
win10v2004-20250314-en
General
-
Target
Maze.exe
-
Size
364KB
-
MD5
b93616a1ea4f4a131cc0507e6c789f94
-
SHA1
0b97455143e682e818fc4a9b615f57349dc84894
-
SHA256
2a6c602769ac15bd837f9ff390acc443d023ee62f76e1be8236dd2dd957eef3d
-
SHA512
e6b8e4009ee946514c0a177838b1094b70fe84d8e4511e8ab9bca4180b0bf4cc5bf2ef563fb7efabd6cc91d758ed2e910f501081a72aaa9581d17ece780b70ad
-
SSDEEP
6144:jx0s5c9jrLrLrLZMEQ9V6wZqEZw0eNsd19pV50DEreNg/ydlb4fQ6wFMvM:9MAwmMD/Ng6dNoQl+v
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c7f0cc8c8e33fa2
https://mazedecrypt.top/6c7f0cc8c8e33fa2
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Maze family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c7f0cc8c8e33fa2.tmp Maze.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c7f0cc8c8e33fa2.tmp Maze.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" Maze.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification C:\Program Files\ImportNew.dib Maze.exe File opened for modification C:\Program Files\JoinConvert.m4v Maze.exe File opened for modification C:\Program Files\RequestDismount.mp4 Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6c7f0cc8c8e33fa2.tmp Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt Maze.exe File created C:\Program Files\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\6c7f0cc8c8e33fa2.tmp Maze.exe File opened for modification C:\Program Files\RepairMount.mpe Maze.exe File opened for modification C:\Program Files\ResolveUninstall.mpv2 Maze.exe File opened for modification C:\Program Files\StepStart.cr2 Maze.exe File opened for modification C:\Program Files\UseTrace.lock Maze.exe File opened for modification C:\Program Files (x86)\6c7f0cc8c8e33fa2.tmp Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6c7f0cc8c8e33fa2.tmp Maze.exe File opened for modification C:\Program Files\ApproveProtect.wax Maze.exe File opened for modification C:\Program Files\InitializeSkip.DVR Maze.exe File opened for modification C:\Program Files\OutConfirm.xps Maze.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6c7f0cc8c8e33fa2.tmp Maze.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 808 Maze.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 2120 vssvc.exe Token: SeRestorePrivilege 2120 vssvc.exe Token: SeAuditPrivilege 2120 vssvc.exe Token: SeIncreaseQuotaPrivilege 1884 wmic.exe Token: SeSecurityPrivilege 1884 wmic.exe Token: SeTakeOwnershipPrivilege 1884 wmic.exe Token: SeLoadDriverPrivilege 1884 wmic.exe Token: SeSystemProfilePrivilege 1884 wmic.exe Token: SeSystemtimePrivilege 1884 wmic.exe Token: SeProfSingleProcessPrivilege 1884 wmic.exe Token: SeIncBasePriorityPrivilege 1884 wmic.exe Token: SeCreatePagefilePrivilege 1884 wmic.exe Token: SeBackupPrivilege 1884 wmic.exe Token: SeRestorePrivilege 1884 wmic.exe Token: SeShutdownPrivilege 1884 wmic.exe Token: SeDebugPrivilege 1884 wmic.exe Token: SeSystemEnvironmentPrivilege 1884 wmic.exe Token: SeRemoteShutdownPrivilege 1884 wmic.exe Token: SeUndockPrivilege 1884 wmic.exe Token: SeManageVolumePrivilege 1884 wmic.exe Token: 33 1884 wmic.exe Token: 34 1884 wmic.exe Token: 35 1884 wmic.exe Token: SeIncreaseQuotaPrivilege 1884 wmic.exe Token: SeSecurityPrivilege 1884 wmic.exe Token: SeTakeOwnershipPrivilege 1884 wmic.exe Token: SeLoadDriverPrivilege 1884 wmic.exe Token: SeSystemProfilePrivilege 1884 wmic.exe Token: SeSystemtimePrivilege 1884 wmic.exe Token: SeProfSingleProcessPrivilege 1884 wmic.exe Token: SeIncBasePriorityPrivilege 1884 wmic.exe Token: SeCreatePagefilePrivilege 1884 wmic.exe Token: SeBackupPrivilege 1884 wmic.exe Token: SeRestorePrivilege 1884 wmic.exe Token: SeShutdownPrivilege 1884 wmic.exe Token: SeDebugPrivilege 1884 wmic.exe Token: SeSystemEnvironmentPrivilege 1884 wmic.exe Token: SeRemoteShutdownPrivilege 1884 wmic.exe Token: SeUndockPrivilege 1884 wmic.exe Token: SeManageVolumePrivilege 1884 wmic.exe Token: 33 1884 wmic.exe Token: 34 1884 wmic.exe Token: 35 1884 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 1884 808 Maze.exe 34 PID 808 wrote to memory of 1884 808 Maze.exe 34 PID 808 wrote to memory of 1884 808 Maze.exe 34 PID 808 wrote to memory of 1884 808 Maze.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maze.exe"C:\Users\Admin\AppData\Local\Temp\Maze.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\system32\wbem\wmic.exe"C:\xdeif\m\..\..\Windows\i\mgyr\kpvc\..\..\..\system32\da\teq\..\..\wbem\eqr\ssfo\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5baa4b53eec476c5f1ac57a6934722da9
SHA1faf5cb61ea5c1a4111b1fc6d8312ed31774c1eaf
SHA256cbdcea1ca029ca656bf78068f4886784f4561a271cc39651cfad9f71d143cfbf
SHA512d883cc16eadc5251b7f2e9e00fb5e8bf43a5801e96d9cc24fdb94978eca5f77cb7884aab4f982f4fd907350764d79b358cd9b784b3b7ab7ff2b3e18e5a853bcb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_A50A0C0F088544A48D09030C447FD52B.dat
Filesize940B
MD55c219384355ac454800121d3430f0a7f
SHA1f8acc0a21ce5fd43b5e72f85a24cff64d6ea5a55
SHA256a686a15d608a843942bb64e678a5f5533efbd1c91b38dd9ef5449eed330281ec
SHA512a8ad7df218869b24145fba4054ee9040cd25e1d43135827010bb85e975c947a386144ceb5a97de7be29be1d1db5239cffb20109aad8365cf63f2cb04ad1ff765