Analysis
-
max time kernel
299s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
Maze.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Maze.exe
Resource
win10v2004-20250314-en
General
-
Target
Maze.exe
-
Size
364KB
-
MD5
b93616a1ea4f4a131cc0507e6c789f94
-
SHA1
0b97455143e682e818fc4a9b615f57349dc84894
-
SHA256
2a6c602769ac15bd837f9ff390acc443d023ee62f76e1be8236dd2dd957eef3d
-
SHA512
e6b8e4009ee946514c0a177838b1094b70fe84d8e4511e8ab9bca4180b0bf4cc5bf2ef563fb7efabd6cc91d758ed2e910f501081a72aaa9581d17ece780b70ad
-
SSDEEP
6144:jx0s5c9jrLrLrLZMEQ9V6wZqEZw0eNsd19pV50DEreNg/ydlb4fQ6wFMvM:9MAwmMD/Ng6dNoQl+v
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6ccd0cd3319cfefa
https://mazedecrypt.top/6ccd0cd3319cfefa
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Maze family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6ccd0cd3319cfefa.tmp Maze.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6ccd0cd3319cfefa.tmp Maze.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" Maze.exe -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification C:\Program Files\ExitRequest.doc Maze.exe File opened for modification C:\Program Files\GrantWrite.wps Maze.exe File opened for modification C:\Program Files\HideUninstall.rle Maze.exe File opened for modification C:\Program Files\LockSync.mp2 Maze.exe File opened for modification C:\Program Files\SplitGet.mid Maze.exe File opened for modification C:\Program Files\SubmitImport.mpg Maze.exe File opened for modification C:\Program Files\SuspendEnable.ps1 Maze.exe File opened for modification C:\Program Files\DisablePing.vst Maze.exe File opened for modification C:\Program Files\InvokeLock.m4a Maze.exe File opened for modification C:\Program Files\RevokeEnter.ps1 Maze.exe File opened for modification C:\Program Files (x86)\6ccd0cd3319cfefa.tmp Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\ClearProtect.docx Maze.exe File opened for modification C:\Program Files\ConfirmUse.reg Maze.exe File opened for modification C:\Program Files\EnterExpand.mid Maze.exe File opened for modification C:\Program Files\UninstallLimit.mpeg Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\DECRYPT-FILES.txt Maze.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\6ccd0cd3319cfefa.tmp Maze.exe File opened for modification C:\Program Files\6ccd0cd3319cfefa.tmp Maze.exe File opened for modification C:\Program Files\OutProtect.DVR-MS Maze.exe File opened for modification C:\Program Files\RegisterHide.avi Maze.exe File opened for modification C:\Program Files\TraceSwitch.pot Maze.exe File opened for modification C:\Program Files\CompressApprove.wdp Maze.exe File opened for modification C:\Program Files\ConvertSave.pot Maze.exe File opened for modification C:\Program Files\GetSubmit.aiff Maze.exe File opened for modification C:\Program Files\PushMount.xlsm Maze.exe File opened for modification C:\Program Files\RepairSend.bmp Maze.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\ResolveBlock.nfo Maze.exe File opened for modification C:\Program Files\SelectDeny.TTS Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\6ccd0cd3319cfefa.tmp Maze.exe File created C:\Program Files\DECRYPT-FILES.txt Maze.exe File opened for modification C:\Program Files\CompareHide.doc Maze.exe File opened for modification C:\Program Files\ExportPop.ogg Maze.exe File opened for modification C:\Program Files\LimitReceive.xlsx Maze.exe File opened for modification C:\Program Files\PublishConvert.potm Maze.exe File opened for modification C:\Program Files\RequestMount.zip Maze.exe File opened for modification C:\Program Files\CloseCopy.pot Maze.exe File opened for modification C:\Program Files\OutExpand.xhtml Maze.exe File opened for modification C:\Program Files\RegisterSearch.vssx Maze.exe File opened for modification C:\Program Files\RemoveOpen.docx Maze.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6ccd0cd3319cfefa.tmp Maze.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 Maze.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 264 vssvc.exe Token: SeRestorePrivilege 264 vssvc.exe Token: SeAuditPrivilege 264 vssvc.exe Token: SeIncreaseQuotaPrivilege 2904 wmic.exe Token: SeSecurityPrivilege 2904 wmic.exe Token: SeTakeOwnershipPrivilege 2904 wmic.exe Token: SeLoadDriverPrivilege 2904 wmic.exe Token: SeSystemProfilePrivilege 2904 wmic.exe Token: SeSystemtimePrivilege 2904 wmic.exe Token: SeProfSingleProcessPrivilege 2904 wmic.exe Token: SeIncBasePriorityPrivilege 2904 wmic.exe Token: SeCreatePagefilePrivilege 2904 wmic.exe Token: SeBackupPrivilege 2904 wmic.exe Token: SeRestorePrivilege 2904 wmic.exe Token: SeShutdownPrivilege 2904 wmic.exe Token: SeDebugPrivilege 2904 wmic.exe Token: SeSystemEnvironmentPrivilege 2904 wmic.exe Token: SeRemoteShutdownPrivilege 2904 wmic.exe Token: SeUndockPrivilege 2904 wmic.exe Token: SeManageVolumePrivilege 2904 wmic.exe Token: 33 2904 wmic.exe Token: 34 2904 wmic.exe Token: 35 2904 wmic.exe Token: SeIncreaseQuotaPrivilege 2904 wmic.exe Token: SeSecurityPrivilege 2904 wmic.exe Token: SeTakeOwnershipPrivilege 2904 wmic.exe Token: SeLoadDriverPrivilege 2904 wmic.exe Token: SeSystemProfilePrivilege 2904 wmic.exe Token: SeSystemtimePrivilege 2904 wmic.exe Token: SeProfSingleProcessPrivilege 2904 wmic.exe Token: SeIncBasePriorityPrivilege 2904 wmic.exe Token: SeCreatePagefilePrivilege 2904 wmic.exe Token: SeBackupPrivilege 2904 wmic.exe Token: SeRestorePrivilege 2904 wmic.exe Token: SeShutdownPrivilege 2904 wmic.exe Token: SeDebugPrivilege 2904 wmic.exe Token: SeSystemEnvironmentPrivilege 2904 wmic.exe Token: SeRemoteShutdownPrivilege 2904 wmic.exe Token: SeUndockPrivilege 2904 wmic.exe Token: SeManageVolumePrivilege 2904 wmic.exe Token: 33 2904 wmic.exe Token: 34 2904 wmic.exe Token: 35 2904 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2904 3052 Maze.exe 34 PID 3052 wrote to memory of 2904 3052 Maze.exe 34 PID 3052 wrote to memory of 2904 3052 Maze.exe 34 PID 3052 wrote to memory of 2904 3052 Maze.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maze.exe"C:\Users\Admin\AppData\Local\Temp\Maze.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\wbem\wmic.exe"C:\rvvlc\at\idgc\..\..\..\Windows\ge\..\system32\uqgv\s\nnxkw\..\..\..\wbem\hu\jgauo\hm\..\..\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:264
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5142b142563fa3e7f7e6593bae4534698
SHA104ac5f62e4baa7f33ff77701585bdc37e007d46b
SHA256487d7a42a6926012d643111f7f02b3a9f3ce5dc9c69cdd52f6d30ba2ed652bd2
SHA5126ebda76daa8400245a7d8cc77f70c0601f7861f6dd494b416cb2ae250bcd424e1586710c2f5815ef0ff51e90dff23a8c3d67dfdc16f39c73cf59cfa07828918b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_B59C5E495DE5476595B0E8F303A9D5F1.dat
Filesize940B
MD5f157b74fe373b5f9700a9cd9aa992b31
SHA1b144b0e6486f49e8ecef5ad86d6610ec16689272
SHA2567f0f889775821ed76b930bc0b1833e86540ce4aab0f7c44ba9f5a4a7e78b31b0
SHA512a4b7e7bc519d2c1a71846ab5ced1606ff9d85a1a8792c508eb926d494ce92de7be578e888dfe623f3f1e584e0c54b6beea9cb388d533216e640a0e1fac356925