Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
Maze.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Maze.exe
Resource
win10v2004-20250314-en
General
-
Target
Maze.exe
-
Size
364KB
-
MD5
b93616a1ea4f4a131cc0507e6c789f94
-
SHA1
0b97455143e682e818fc4a9b615f57349dc84894
-
SHA256
2a6c602769ac15bd837f9ff390acc443d023ee62f76e1be8236dd2dd957eef3d
-
SHA512
e6b8e4009ee946514c0a177838b1094b70fe84d8e4511e8ab9bca4180b0bf4cc5bf2ef563fb7efabd6cc91d758ed2e910f501081a72aaa9581d17ece780b70ad
-
SSDEEP
6144:jx0s5c9jrLrLrLZMEQ9V6wZqEZw0eNsd19pV50DEreNg/ydlb4fQ6wFMvM:9MAwmMD/Ng6dNoQl+v
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6b310c9f7e210d5a
https://mazedecrypt.top/6b310c9f7e210d5a
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Maze family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b310c9f7e210d5a.tmp Maze.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6b310c9f7e210d5a.tmp Maze.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" Maze.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File created C:\Program Files\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\ResolveEnter.ods Maze.exe File opened for modification C:\Program Files\SelectUnpublish.wmx Maze.exe File opened for modification C:\Program Files\SkipSplit.wmf Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6b310c9f7e210d5a.tmp Maze.exe File opened for modification C:\Program Files\BlockProtect.vdw Maze.exe File opened for modification C:\Program Files\EnterFind.TTS Maze.exe File opened for modification C:\Program Files\ResolveRequest.mp4v Maze.exe File opened for modification C:\Program Files\SkipLock.ps1 Maze.exe File opened for modification C:\Program Files\UnpublishHide.dotx Maze.exe File opened for modification C:\Program Files\UnregisterCopy.ogg Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6b310c9f7e210d5a.tmp Maze.exe File opened for modification C:\Program Files\GroupInvoke.dot Maze.exe File opened for modification C:\Program Files\PushConvertTo.nfo Maze.exe File opened for modification C:\Program Files\ResetGrant.mht Maze.exe File opened for modification C:\Program Files\SelectConvert.mp3 Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6b310c9f7e210d5a.tmp Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\ConfirmRename.cab Maze.exe File opened for modification C:\Program Files\UnlockResolve.jpeg Maze.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\EditUnprotect.dwg Maze.exe File opened for modification C:\Program Files\WatchStart.css Maze.exe File opened for modification C:\Program Files\CloseClear.jpg Maze.exe File opened for modification C:\Program Files\ConvertPush.snd Maze.exe File opened for modification C:\Program Files\DenyPop.pcx Maze.exe File opened for modification C:\Program Files\PopConvertFrom.mov Maze.exe File opened for modification C:\Program Files\UndoEdit.M2TS Maze.exe File opened for modification C:\Program Files\6b310c9f7e210d5a.tmp Maze.exe File opened for modification C:\Program Files\LimitUnlock.xps Maze.exe File opened for modification C:\Program Files\SplitOpen.gif Maze.exe File opened for modification C:\Program Files\TraceImport.hta Maze.exe File opened for modification C:\Program Files\WatchReset.mp4 Maze.exe File opened for modification C:\Program Files (x86)\6b310c9f7e210d5a.tmp Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\InvokeGet.ico Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt Maze.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3048 Maze.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 2864 vssvc.exe Token: SeRestorePrivilege 2864 vssvc.exe Token: SeAuditPrivilege 2864 vssvc.exe Token: SeIncreaseQuotaPrivilege 364 wmic.exe Token: SeSecurityPrivilege 364 wmic.exe Token: SeTakeOwnershipPrivilege 364 wmic.exe Token: SeLoadDriverPrivilege 364 wmic.exe Token: SeSystemProfilePrivilege 364 wmic.exe Token: SeSystemtimePrivilege 364 wmic.exe Token: SeProfSingleProcessPrivilege 364 wmic.exe Token: SeIncBasePriorityPrivilege 364 wmic.exe Token: SeCreatePagefilePrivilege 364 wmic.exe Token: SeBackupPrivilege 364 wmic.exe Token: SeRestorePrivilege 364 wmic.exe Token: SeShutdownPrivilege 364 wmic.exe Token: SeDebugPrivilege 364 wmic.exe Token: SeSystemEnvironmentPrivilege 364 wmic.exe Token: SeRemoteShutdownPrivilege 364 wmic.exe Token: SeUndockPrivilege 364 wmic.exe Token: SeManageVolumePrivilege 364 wmic.exe Token: 33 364 wmic.exe Token: 34 364 wmic.exe Token: 35 364 wmic.exe Token: SeIncreaseQuotaPrivilege 364 wmic.exe Token: SeSecurityPrivilege 364 wmic.exe Token: SeTakeOwnershipPrivilege 364 wmic.exe Token: SeLoadDriverPrivilege 364 wmic.exe Token: SeSystemProfilePrivilege 364 wmic.exe Token: SeSystemtimePrivilege 364 wmic.exe Token: SeProfSingleProcessPrivilege 364 wmic.exe Token: SeIncBasePriorityPrivilege 364 wmic.exe Token: SeCreatePagefilePrivilege 364 wmic.exe Token: SeBackupPrivilege 364 wmic.exe Token: SeRestorePrivilege 364 wmic.exe Token: SeShutdownPrivilege 364 wmic.exe Token: SeDebugPrivilege 364 wmic.exe Token: SeSystemEnvironmentPrivilege 364 wmic.exe Token: SeRemoteShutdownPrivilege 364 wmic.exe Token: SeUndockPrivilege 364 wmic.exe Token: SeManageVolumePrivilege 364 wmic.exe Token: 33 364 wmic.exe Token: 34 364 wmic.exe Token: 35 364 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 364 3048 Maze.exe 34 PID 3048 wrote to memory of 364 3048 Maze.exe 34 PID 3048 wrote to memory of 364 3048 Maze.exe 34 PID 3048 wrote to memory of 364 3048 Maze.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maze.exe"C:\Users\Admin\AppData\Local\Temp\Maze.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\wbem\wmic.exe"C:\ahju\..\Windows\xcix\p\p\..\..\..\system32\ptf\..\wbem\ftmew\pmm\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_5FD51A1FE2E94DAEBA26143765C49F36.dat
Filesize940B
MD574d6df00c5bd88f640118c59ba7d0bb6
SHA1623f572371037ed06191d3c6316dd58f3b9ca24c
SHA2567e7cac105a1f121293019dd525e74d29e2181d8e10a4945fb55e165eb6043908
SHA512aa793860fa80c6ae498db00e02d94f3f89621213b81a4af3f3ec3f6b37b102700234cfe2d050b72a279528547098b76fce2d9434b48288a02c58ddf15f73b1a4
-
Filesize
10KB
MD5e72adacf00b7296af98af451edf19eec
SHA176df3620d65720dbdbe3796320153eb8475f510b
SHA256c29b10fe4b3f27d860967e1d69ae15b2e5922f391ec5fd79cda3d94a4ddd93a4
SHA512d684af3e8a047671bb0ce5ca94a0d693f889387eba1b781739ac9705df87548bf40545aace47540fc5bd513a62fd24059e88329ec5244489093ba858483360b9