Analysis
-
max time kernel
103s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 13:07
Static task
static1
Behavioral task
behavioral1
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win7
Behavioral task
behavioral2
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win10
General
-
Target
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Extracted
C:\Users\Admin\Desktop\GetStep.vsdm.txt
wastedlocker
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2980 NOTEPAD.EXE -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3916 vssadmin.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1104 attrib.exe 996 attrib.exe 692 attrib.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3796 vssvc.exe Token: SeRestorePrivilege 3796 vssvc.exe Token: SeAuditPrivilege 3796 vssvc.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Possible privilege escalation attempt 2 IoCs
pid Process 1660 takeown.exe 3988 icacls.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Initial:bin 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Initial.exe Initial:bin File opened for modification C:\Windows\SysWOW64\Initial.exe attrib.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3836 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 67 PID 3068 wrote to memory of 3836 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 67 PID 3068 wrote to memory of 3836 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 67 PID 3836 wrote to memory of 3916 3836 Initial:bin 68 PID 3836 wrote to memory of 3916 3836 Initial:bin 68 PID 3836 wrote to memory of 1660 3836 Initial:bin 72 PID 3836 wrote to memory of 1660 3836 Initial:bin 72 PID 3836 wrote to memory of 1660 3836 Initial:bin 72 PID 3836 wrote to memory of 3988 3836 Initial:bin 74 PID 3836 wrote to memory of 3988 3836 Initial:bin 74 PID 3836 wrote to memory of 3988 3836 Initial:bin 74 PID 3100 wrote to memory of 3976 3100 Initial.exe 77 PID 3100 wrote to memory of 3976 3100 Initial.exe 77 PID 3100 wrote to memory of 3976 3100 Initial.exe 77 PID 3976 wrote to memory of 2068 3976 cmd.exe 79 PID 3976 wrote to memory of 2068 3976 cmd.exe 79 PID 3976 wrote to memory of 2068 3976 cmd.exe 79 PID 3836 wrote to memory of 3764 3836 Initial:bin 81 PID 3836 wrote to memory of 3764 3836 Initial:bin 81 PID 3836 wrote to memory of 3764 3836 Initial:bin 81 PID 3068 wrote to memory of 416 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 83 PID 3068 wrote to memory of 416 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 83 PID 3068 wrote to memory of 416 3068 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 83 PID 3764 wrote to memory of 896 3764 cmd.exe 85 PID 3764 wrote to memory of 896 3764 cmd.exe 85 PID 3764 wrote to memory of 896 3764 cmd.exe 85 PID 416 wrote to memory of 836 416 cmd.exe 86 PID 416 wrote to memory of 836 416 cmd.exe 86 PID 416 wrote to memory of 836 416 cmd.exe 86 PID 3976 wrote to memory of 996 3976 cmd.exe 87 PID 3976 wrote to memory of 996 3976 cmd.exe 87 PID 3976 wrote to memory of 996 3976 cmd.exe 87 PID 3764 wrote to memory of 692 3764 cmd.exe 88 PID 3764 wrote to memory of 692 3764 cmd.exe 88 PID 3764 wrote to memory of 692 3764 cmd.exe 88 PID 416 wrote to memory of 1104 416 cmd.exe 89 PID 416 wrote to memory of 1104 416 cmd.exe 89 PID 416 wrote to memory of 1104 416 cmd.exe 89 -
Executes dropped EXE 2 IoCs
pid Process 3836 Initial:bin 3100 Initial.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1660 takeown.exe 3988 icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\Initial:binC:\Users\Admin\AppData\Roaming\Initial:bin -r2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3836 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:3916
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Initial.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1660
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Initial.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3988
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Initial" & del "C:\Users\Admin\AppData\Roaming\Initial"3⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:896
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Initial"4⤵
- Views/modifies file attributes
PID:692
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe" & del "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:836
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"3⤵
- Views/modifies file attributes
PID:1104
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:3796
-
C:\Windows\SysWOW64\Initial.exeC:\Windows\SysWOW64\Initial.exe -s1⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Initial.exe" & del "C:\Windows\SysWOW64\Initial.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2068
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Initial.exe"3⤵
- Views/modifies file attributes
- Drops file in System32 directory
PID:996
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GetStep.vsdm.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2980