Analysis
-
max time kernel
126s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 12:03
Static task
static1
Behavioral task
behavioral1
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win7
Behavioral task
behavioral2
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
Resource
win10v200430
General
-
Target
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 4080 takeown.exe 3612 icacls.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 952 vssadmin.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mui.exe Mui:bin File opened for modification C:\Windows\SysWOW64\Mui.exe attrib.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 4080 takeown.exe 3612 icacls.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3740 attrib.exe 2668 attrib.exe 3228 attrib.exe -
Executes dropped EXE 2 IoCs
pid Process 1840 Mui:bin 3944 Mui.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Mui:bin 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1840 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 1628 wrote to memory of 1840 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 1628 wrote to memory of 1840 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 68 PID 1840 wrote to memory of 952 1840 Mui:bin 69 PID 1840 wrote to memory of 952 1840 Mui:bin 69 PID 1840 wrote to memory of 4080 1840 Mui:bin 73 PID 1840 wrote to memory of 4080 1840 Mui:bin 73 PID 1840 wrote to memory of 4080 1840 Mui:bin 73 PID 1840 wrote to memory of 3612 1840 Mui:bin 75 PID 1840 wrote to memory of 3612 1840 Mui:bin 75 PID 1840 wrote to memory of 3612 1840 Mui:bin 75 PID 3944 wrote to memory of 3996 3944 Mui.exe 80 PID 3944 wrote to memory of 3996 3944 Mui.exe 80 PID 3944 wrote to memory of 3996 3944 Mui.exe 80 PID 3996 wrote to memory of 3256 3996 cmd.exe 82 PID 3996 wrote to memory of 3256 3996 cmd.exe 82 PID 3996 wrote to memory of 3256 3996 cmd.exe 82 PID 1840 wrote to memory of 4064 1840 Mui:bin 83 PID 1840 wrote to memory of 4064 1840 Mui:bin 83 PID 1840 wrote to memory of 4064 1840 Mui:bin 83 PID 1628 wrote to memory of 64 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 85 PID 1628 wrote to memory of 64 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 85 PID 1628 wrote to memory of 64 1628 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe 85 PID 4064 wrote to memory of 3644 4064 cmd.exe 87 PID 4064 wrote to memory of 3644 4064 cmd.exe 87 PID 4064 wrote to memory of 3644 4064 cmd.exe 87 PID 64 wrote to memory of 2968 64 cmd.exe 88 PID 64 wrote to memory of 2968 64 cmd.exe 88 PID 64 wrote to memory of 2968 64 cmd.exe 88 PID 3996 wrote to memory of 3740 3996 cmd.exe 92 PID 3996 wrote to memory of 3740 3996 cmd.exe 92 PID 3996 wrote to memory of 3740 3996 cmd.exe 92 PID 64 wrote to memory of 2668 64 cmd.exe 93 PID 64 wrote to memory of 2668 64 cmd.exe 93 PID 64 wrote to memory of 2668 64 cmd.exe 93 PID 4064 wrote to memory of 3228 4064 cmd.exe 94 PID 4064 wrote to memory of 3228 4064 cmd.exe 94 PID 4064 wrote to memory of 3228 4064 cmd.exe 94 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2084 vssvc.exe Token: SeRestorePrivilege 2084 vssvc.exe Token: SeAuditPrivilege 2084 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\Mui:binC:\Users\Admin\AppData\Roaming\Mui:bin -r2⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:952
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Mui.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:4080
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Mui.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:3612
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Mui" & del "C:\Users\Admin\AppData\Roaming\Mui"3⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:3644
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Mui"4⤵
- Views/modifies file attributes
PID:3228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe" & del "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2968
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.exe"3⤵
- Views/modifies file attributes
PID:2668
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
C:\Windows\SysWOW64\Mui.exeC:\Windows\SysWOW64\Mui.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Mui.exe" & del "C:\Windows\SysWOW64\Mui.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:3256
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Mui.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:3740
-
-