Analysis
-
max time kernel
75s -
max time network
69s -
platform
windows7_x64 -
resource
win7 -
submitted
30-06-2020 15:30
Static task
static1
Behavioral task
behavioral1
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
Resource
win7
Behavioral task
behavioral2
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
Resource
win10v200430
General
-
Target
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
-
Size
56KB
-
MD5
ecb00e9a61f99a7d4c90723294986bbc
-
SHA1
be59c867da75e2a66b8c2519e950254f817cd4ad
-
SHA256
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80
-
SHA512
9dee79827d865de41a63962b419eed7e1f9610ff27f00f8b7b2b9f51e905d5db907d310da590d8f1a11ac88e549373edf39bffdb44d1b205728f1b5e0a43aa5e
Malware Config
Extracted
C:\Users\Admin\Desktop\DisconnectWait.lock.txt
wastedlocker
Signatures
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Backup:bin 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe -
Loads dropped DLL 2 IoCs
pid Process 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 752 vssadmin.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Backup.exe Backup:bin File opened for modification C:\Windows\SysWOW64\Backup.exe attrib.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 620 NOTEPAD.EXE -
Executes dropped EXE 2 IoCs
pid Process 308 Backup:bin 1900 Backup.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1980 attrib.exe 1964 attrib.exe 2024 attrib.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1832 takeown.exe 1876 icacls.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1832 takeown.exe 1876 icacls.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 900 wrote to memory of 308 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 24 PID 900 wrote to memory of 308 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 24 PID 900 wrote to memory of 308 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 24 PID 900 wrote to memory of 308 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 24 PID 308 wrote to memory of 752 308 Backup:bin 25 PID 308 wrote to memory of 752 308 Backup:bin 25 PID 308 wrote to memory of 752 308 Backup:bin 25 PID 308 wrote to memory of 752 308 Backup:bin 25 PID 308 wrote to memory of 1832 308 Backup:bin 29 PID 308 wrote to memory of 1832 308 Backup:bin 29 PID 308 wrote to memory of 1832 308 Backup:bin 29 PID 308 wrote to memory of 1832 308 Backup:bin 29 PID 308 wrote to memory of 1876 308 Backup:bin 31 PID 308 wrote to memory of 1876 308 Backup:bin 31 PID 308 wrote to memory of 1876 308 Backup:bin 31 PID 308 wrote to memory of 1876 308 Backup:bin 31 PID 1900 wrote to memory of 1764 1900 Backup.exe 35 PID 1900 wrote to memory of 1764 1900 Backup.exe 35 PID 1900 wrote to memory of 1764 1900 Backup.exe 35 PID 1900 wrote to memory of 1764 1900 Backup.exe 35 PID 308 wrote to memory of 1756 308 Backup:bin 36 PID 308 wrote to memory of 1756 308 Backup:bin 36 PID 308 wrote to memory of 1756 308 Backup:bin 36 PID 308 wrote to memory of 1756 308 Backup:bin 36 PID 900 wrote to memory of 1608 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 37 PID 900 wrote to memory of 1608 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 37 PID 900 wrote to memory of 1608 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 37 PID 900 wrote to memory of 1608 900 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 37 PID 1756 wrote to memory of 1704 1756 cmd.exe 41 PID 1756 wrote to memory of 1704 1756 cmd.exe 41 PID 1756 wrote to memory of 1704 1756 cmd.exe 41 PID 1756 wrote to memory of 1704 1756 cmd.exe 41 PID 1764 wrote to memory of 1624 1764 cmd.exe 42 PID 1764 wrote to memory of 1624 1764 cmd.exe 42 PID 1764 wrote to memory of 1624 1764 cmd.exe 42 PID 1764 wrote to memory of 1624 1764 cmd.exe 42 PID 1608 wrote to memory of 1976 1608 cmd.exe 43 PID 1608 wrote to memory of 1976 1608 cmd.exe 43 PID 1608 wrote to memory of 1976 1608 cmd.exe 43 PID 1608 wrote to memory of 1976 1608 cmd.exe 43 PID 1756 wrote to memory of 2024 1756 cmd.exe 44 PID 1756 wrote to memory of 2024 1756 cmd.exe 44 PID 1756 wrote to memory of 2024 1756 cmd.exe 44 PID 1756 wrote to memory of 2024 1756 cmd.exe 44 PID 1764 wrote to memory of 1980 1764 cmd.exe 45 PID 1764 wrote to memory of 1980 1764 cmd.exe 45 PID 1764 wrote to memory of 1980 1764 cmd.exe 45 PID 1764 wrote to memory of 1980 1764 cmd.exe 45 PID 1608 wrote to memory of 1964 1608 cmd.exe 46 PID 1608 wrote to memory of 1964 1608 cmd.exe 46 PID 1608 wrote to memory of 1964 1608 cmd.exe 46 PID 1608 wrote to memory of 1964 1608 cmd.exe 46 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1088 vssvc.exe Token: SeRestorePrivilege 1088 vssvc.exe Token: SeAuditPrivilege 1088 vssvc.exe -
Deletes itself 1 IoCs
pid Process 1608 cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"1⤵
- NTFS ADS
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Backup:binC:\Users\Admin\AppData\Roaming\Backup:bin -r2⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:752
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Backup.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1832
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Backup.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1876
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Backup" & del "C:\Users\Admin\AppData\Roaming\Backup"3⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1704
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Backup"4⤵
- Views/modifies file attributes
PID:2024
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe" & del "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"2⤵
- Suspicious use of WriteProcessMemory
- Deletes itself
PID:1608 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1976
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"3⤵
- Views/modifies file attributes
PID:1964
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
C:\Windows\SysWOW64\Backup.exeC:\Windows\SysWOW64\Backup.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Backup.exe" & del "C:\Windows\SysWOW64\Backup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1624
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Backup.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1980
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\DisconnectWait.lock.txt1⤵
- Opens file in notepad (likely ransom note)
PID:620