Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
30-06-2020 15:30
Static task
static1
Behavioral task
behavioral1
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
Resource
win7
Behavioral task
behavioral2
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
Resource
win10v200430
General
-
Target
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
-
Size
56KB
-
MD5
ecb00e9a61f99a7d4c90723294986bbc
-
SHA1
be59c867da75e2a66b8c2519e950254f817cd4ad
-
SHA256
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80
-
SHA512
9dee79827d865de41a63962b419eed7e1f9610ff27f00f8b7b2b9f51e905d5db907d310da590d8f1a11ac88e549373edf39bffdb44d1b205728f1b5e0a43aa5e
Malware Config
Extracted
C:\Users\Admin\Desktop\MoveDeny.mpeg3.eswasted_info.txt
wastedlocker
Signatures
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 256 attrib.exe 276 attrib.exe 1736 attrib.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 Mode:bin 3860 Mode.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2392 vssvc.exe Token: SeRestorePrivilege 2392 vssvc.exe Token: SeAuditPrivilege 2392 vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1980 vssadmin.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 296 takeown.exe 2836 icacls.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 296 takeown.exe 2836 icacls.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1740 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 68 PID 1628 wrote to memory of 1740 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 68 PID 1628 wrote to memory of 1740 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 68 PID 1740 wrote to memory of 1980 1740 Mode:bin 69 PID 1740 wrote to memory of 1980 1740 Mode:bin 69 PID 1740 wrote to memory of 296 1740 Mode:bin 73 PID 1740 wrote to memory of 296 1740 Mode:bin 73 PID 1740 wrote to memory of 296 1740 Mode:bin 73 PID 1740 wrote to memory of 2836 1740 Mode:bin 75 PID 1740 wrote to memory of 2836 1740 Mode:bin 75 PID 1740 wrote to memory of 2836 1740 Mode:bin 75 PID 3860 wrote to memory of 3868 3860 Mode.exe 79 PID 3860 wrote to memory of 3868 3860 Mode.exe 79 PID 3860 wrote to memory of 3868 3860 Mode.exe 79 PID 3868 wrote to memory of 4004 3868 cmd.exe 81 PID 3868 wrote to memory of 4004 3868 cmd.exe 81 PID 3868 wrote to memory of 4004 3868 cmd.exe 81 PID 1740 wrote to memory of 1772 1740 Mode:bin 82 PID 1740 wrote to memory of 1772 1740 Mode:bin 82 PID 1740 wrote to memory of 1772 1740 Mode:bin 82 PID 1628 wrote to memory of 4024 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 84 PID 1628 wrote to memory of 4024 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 84 PID 1628 wrote to memory of 4024 1628 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe 84 PID 1772 wrote to memory of 1652 1772 cmd.exe 86 PID 1772 wrote to memory of 1652 1772 cmd.exe 86 PID 1772 wrote to memory of 1652 1772 cmd.exe 86 PID 4024 wrote to memory of 3544 4024 cmd.exe 87 PID 4024 wrote to memory of 3544 4024 cmd.exe 87 PID 4024 wrote to memory of 3544 4024 cmd.exe 87 PID 3868 wrote to memory of 256 3868 cmd.exe 92 PID 3868 wrote to memory of 256 3868 cmd.exe 92 PID 3868 wrote to memory of 256 3868 cmd.exe 92 PID 1772 wrote to memory of 276 1772 cmd.exe 93 PID 1772 wrote to memory of 276 1772 cmd.exe 93 PID 1772 wrote to memory of 276 1772 cmd.exe 93 PID 4024 wrote to memory of 1736 4024 cmd.exe 94 PID 4024 wrote to memory of 1736 4024 cmd.exe 94 PID 4024 wrote to memory of 1736 4024 cmd.exe 94 -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mode.exe Mode:bin File opened for modification C:\Windows\SysWOW64\Mode.exe attrib.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1632 NOTEPAD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Mode:bin 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"1⤵
- Suspicious use of WriteProcessMemory
- NTFS ADS
PID:1628 -
C:\Users\Admin\AppData\Roaming\Mode:binC:\Users\Admin\AppData\Roaming\Mode:bin -r2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
PID:1740 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1980
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Mode.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:296
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Mode.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2836
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Mode" & del "C:\Users\Admin\AppData\Roaming\Mode"3⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1652
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Mode"4⤵
- Views/modifies file attributes
PID:276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe" & del "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:3544
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.exe"3⤵
- Views/modifies file attributes
PID:1736
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:2392
-
C:\Windows\SysWOW64\Mode.exeC:\Windows\SysWOW64\Mode.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Mode.exe" & del "C:\Windows\SysWOW64\Mode.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:4004
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Mode.exe"3⤵
- Views/modifies file attributes
- Drops file in System32 directory
PID:256
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\MoveDeny.mpeg3.eswasted_info.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1632