Analysis
-
max time kernel
44s -
max time network
52s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
30-06-2020 13:07
Static task
static1
Behavioral task
behavioral1
Sample
887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe
Resource
win10
General
-
Target
887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe
-
Size
1.1MB
-
MD5
6b20ef8fb494cc6e455220356de298d0
-
SHA1
763d356d30e81d1cd15f6bc6a31f96181edb0b8f
-
SHA256
887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d
-
SHA512
ef53b73a911a608439bf929fa66a66fbf015ed274735b91c1d3b08128b14d6514d5514157e541441b9de0827d068c8f514cfd24a3a52fecb2d09764c4fb3311a
Malware Config
Extracted
C:\Users\Admin\Desktop\RenameRequest.mpg.txt
wastedlocker
Signatures
-
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1424 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 24 PID 1388 wrote to memory of 1424 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 24 PID 1388 wrote to memory of 1424 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 24 PID 1388 wrote to memory of 1424 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 24 PID 1424 wrote to memory of 1556 1424 Backup:bin 25 PID 1424 wrote to memory of 1556 1424 Backup:bin 25 PID 1424 wrote to memory of 1556 1424 Backup:bin 25 PID 1424 wrote to memory of 1556 1424 Backup:bin 25 PID 1424 wrote to memory of 1804 1424 Backup:bin 29 PID 1424 wrote to memory of 1804 1424 Backup:bin 29 PID 1424 wrote to memory of 1804 1424 Backup:bin 29 PID 1424 wrote to memory of 1804 1424 Backup:bin 29 PID 1424 wrote to memory of 1824 1424 Backup:bin 31 PID 1424 wrote to memory of 1824 1424 Backup:bin 31 PID 1424 wrote to memory of 1824 1424 Backup:bin 31 PID 1424 wrote to memory of 1824 1424 Backup:bin 31 PID 1864 wrote to memory of 520 1864 Backup.exe 35 PID 1864 wrote to memory of 520 1864 Backup.exe 35 PID 1864 wrote to memory of 520 1864 Backup.exe 35 PID 1864 wrote to memory of 520 1864 Backup.exe 35 PID 520 wrote to memory of 1584 520 cmd.exe 37 PID 520 wrote to memory of 1584 520 cmd.exe 37 PID 520 wrote to memory of 1584 520 cmd.exe 37 PID 520 wrote to memory of 1584 520 cmd.exe 37 PID 1424 wrote to memory of 1616 1424 Backup:bin 38 PID 1424 wrote to memory of 1616 1424 Backup:bin 38 PID 1424 wrote to memory of 1616 1424 Backup:bin 38 PID 1424 wrote to memory of 1616 1424 Backup:bin 38 PID 1388 wrote to memory of 1608 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 39 PID 1388 wrote to memory of 1608 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 39 PID 1388 wrote to memory of 1608 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 39 PID 1388 wrote to memory of 1608 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 39 PID 1616 wrote to memory of 268 1616 cmd.exe 42 PID 1616 wrote to memory of 268 1616 cmd.exe 42 PID 1616 wrote to memory of 268 1616 cmd.exe 42 PID 1616 wrote to memory of 268 1616 cmd.exe 42 PID 1608 wrote to memory of 760 1608 cmd.exe 43 PID 1608 wrote to memory of 760 1608 cmd.exe 43 PID 1608 wrote to memory of 760 1608 cmd.exe 43 PID 1608 wrote to memory of 760 1608 cmd.exe 43 PID 520 wrote to memory of 1916 520 cmd.exe 44 PID 520 wrote to memory of 1916 520 cmd.exe 44 PID 520 wrote to memory of 1916 520 cmd.exe 44 PID 520 wrote to memory of 1916 520 cmd.exe 44 PID 1616 wrote to memory of 1940 1616 cmd.exe 45 PID 1616 wrote to memory of 1940 1616 cmd.exe 45 PID 1616 wrote to memory of 1940 1616 cmd.exe 45 PID 1616 wrote to memory of 1940 1616 cmd.exe 45 PID 1608 wrote to memory of 1948 1608 cmd.exe 46 PID 1608 wrote to memory of 1948 1608 cmd.exe 46 PID 1608 wrote to memory of 1948 1608 cmd.exe 46 PID 1608 wrote to memory of 1948 1608 cmd.exe 46 -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1560 NOTEPAD.EXE -
Loads dropped DLL 2 IoCs
pid Process 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe 1388 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Backup:bin 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1804 takeown.exe 1824 icacls.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Executes dropped EXE 2 IoCs
pid Process 1424 Backup:bin 1864 Backup.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 836 vssvc.exe Token: SeRestorePrivilege 836 vssvc.exe Token: SeAuditPrivilege 836 vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1556 vssadmin.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1804 takeown.exe 1824 icacls.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1916 attrib.exe 1940 attrib.exe 1948 attrib.exe -
Deletes itself 1 IoCs
pid Process 1608 cmd.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Backup.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Backup.exe Backup:bin
Processes
-
C:\Users\Admin\AppData\Local\Temp\887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe"C:\Users\Admin\AppData\Local\Temp\887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe"1⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- NTFS ADS
PID:1388 -
C:\Users\Admin\AppData\Roaming\Backup:binC:\Users\Admin\AppData\Roaming\Backup:bin -r2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Drops file in System32 directory
PID:1424 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1556
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Backup.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1804
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Backup.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1824
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Backup" & del "C:\Users\Admin\AppData\Roaming\Backup"3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:268
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Backup"4⤵
- Views/modifies file attributes
PID:1940
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe" & del "C:\Users\Admin\AppData\Local\Temp\887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe"2⤵
- Suspicious use of WriteProcessMemory
- Deletes itself
PID:1608 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:760
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.exe"3⤵
- Views/modifies file attributes
PID:1948
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
PID:836
-
C:\Windows\SysWOW64\Backup.exeC:\Windows\SysWOW64\Backup.exe -s1⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Backup.exe" & del "C:\Windows\SysWOW64\Backup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1584
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Backup.exe"3⤵
- Views/modifies file attributes
- Drops file in System32 directory
PID:1916
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RenameRequest.mpg.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1560