Analysis
-
max time kernel
60s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
29-07-2020 07:12
Static task
static1
Behavioral task
behavioral1
Sample
30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe
Resource
win7
Behavioral task
behavioral2
Sample
30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe
Resource
win10v200722
General
-
Target
30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe
-
Size
1.2MB
-
MD5
14e610e2acb5f15e72f528b385f3e20f
-
SHA1
749b5283028a6f2c9df529eb14e051a5bf620f25
-
SHA256
30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0
-
SHA512
6d8d42e65b5bb09aaaf3c0cf103e7b97ebdc593065f1ecd3e3cd7c5d0a289d93867d617ac3b69c126a754f6f37cfd1867e12822004169077e4eafeb40a79f90a
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe -
Executes dropped EXE 2 IoCs
pid Process 892 Network:bin 1144 Network.exe -
Modifies extensions of user files 24 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\AssertHide.raw.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\DenyRevoke.crw => C:\Users\Admin\Pictures\DenyRevoke.crw.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\DenyRevoke.crw.garminwasted Network.exe File created C:\Users\Admin\Pictures\OutRevoke.tif.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\OutRevoke.tif => C:\Users\Admin\Pictures\OutRevoke.tif.garminwasted Network.exe File created C:\Users\Admin\Pictures\ProtectMerge.tiff.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\ProtectMerge.tiff => C:\Users\Admin\Pictures\ProtectMerge.tiff.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\StartEnable.raw.garminwasted Network.exe File renamed C:\Users\Admin\Pictures\AssertHide.raw => C:\Users\Admin\Pictures\AssertHide.raw.garminwasted Network.exe File created C:\Users\Admin\Pictures\ExportReset.tif.garminwasted_info Network.exe File opened for modification C:\Users\Admin\Pictures\OutRevoke.tif.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\ProtectMerge.tiff.garminwasted Network.exe File created C:\Users\Admin\Pictures\DenyRevoke.crw.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\ExportReset.tif => C:\Users\Admin\Pictures\ExportReset.tif.garminwasted Network.exe File created C:\Users\Admin\Pictures\StepRequest.raw.garminwasted_info Network.exe File opened for modification C:\Users\Admin\Pictures\AssertHide.raw.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\ExportReset.tif.garminwasted Network.exe File created C:\Users\Admin\Pictures\ResumeTrace.raw.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\ResumeTrace.raw => C:\Users\Admin\Pictures\ResumeTrace.raw.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\ResumeTrace.raw.garminwasted Network.exe File created C:\Users\Admin\Pictures\StartEnable.raw.garminwasted_info Network.exe File renamed C:\Users\Admin\Pictures\StartEnable.raw => C:\Users\Admin\Pictures\StartEnable.raw.garminwasted Network.exe File renamed C:\Users\Admin\Pictures\StepRequest.raw => C:\Users\Admin\Pictures\StepRequest.raw.garminwasted Network.exe File opened for modification C:\Users\Admin\Pictures\StepRequest.raw.garminwasted Network.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 892 Network:bin 1144 Network.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1492 wrote to memory of 892 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 24 PID 1492 wrote to memory of 892 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 24 PID 1492 wrote to memory of 892 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 24 PID 1492 wrote to memory of 892 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 24 PID 892 wrote to memory of 556 892 Network:bin 25 PID 892 wrote to memory of 556 892 Network:bin 25 PID 892 wrote to memory of 556 892 Network:bin 25 PID 892 wrote to memory of 556 892 Network:bin 25 PID 892 wrote to memory of 1872 892 Network:bin 29 PID 892 wrote to memory of 1872 892 Network:bin 29 PID 892 wrote to memory of 1872 892 Network:bin 29 PID 892 wrote to memory of 1872 892 Network:bin 29 PID 892 wrote to memory of 1908 892 Network:bin 31 PID 892 wrote to memory of 1908 892 Network:bin 31 PID 892 wrote to memory of 1908 892 Network:bin 31 PID 892 wrote to memory of 1908 892 Network:bin 31 PID 1144 wrote to memory of 1568 1144 Network.exe 35 PID 1144 wrote to memory of 1568 1144 Network.exe 35 PID 1144 wrote to memory of 1568 1144 Network.exe 35 PID 1144 wrote to memory of 1568 1144 Network.exe 35 PID 1568 wrote to memory of 1540 1568 cmd.exe 37 PID 1568 wrote to memory of 1540 1568 cmd.exe 37 PID 1568 wrote to memory of 1540 1568 cmd.exe 37 PID 1568 wrote to memory of 1540 1568 cmd.exe 37 PID 892 wrote to memory of 1988 892 Network:bin 38 PID 892 wrote to memory of 1988 892 Network:bin 38 PID 892 wrote to memory of 1988 892 Network:bin 38 PID 892 wrote to memory of 1988 892 Network:bin 38 PID 1492 wrote to memory of 1976 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 40 PID 1492 wrote to memory of 1976 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 40 PID 1492 wrote to memory of 1976 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 40 PID 1492 wrote to memory of 1976 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 40 PID 1988 wrote to memory of 1936 1988 cmd.exe 41 PID 1988 wrote to memory of 1936 1988 cmd.exe 41 PID 1988 wrote to memory of 1936 1988 cmd.exe 41 PID 1988 wrote to memory of 1936 1988 cmd.exe 41 PID 1976 wrote to memory of 2036 1976 cmd.exe 43 PID 1976 wrote to memory of 2036 1976 cmd.exe 43 PID 1976 wrote to memory of 2036 1976 cmd.exe 43 PID 1976 wrote to memory of 2036 1976 cmd.exe 43 PID 1568 wrote to memory of 2016 1568 cmd.exe 44 PID 1568 wrote to memory of 2016 1568 cmd.exe 44 PID 1568 wrote to memory of 2016 1568 cmd.exe 44 PID 1568 wrote to memory of 2016 1568 cmd.exe 44 PID 1988 wrote to memory of 2000 1988 cmd.exe 45 PID 1988 wrote to memory of 2000 1988 cmd.exe 45 PID 1988 wrote to memory of 2000 1988 cmd.exe 45 PID 1988 wrote to memory of 2000 1988 cmd.exe 45 PID 1976 wrote to memory of 1244 1976 cmd.exe 46 PID 1976 wrote to memory of 1244 1976 cmd.exe 46 PID 1976 wrote to memory of 1244 1976 cmd.exe 46 PID 1976 wrote to memory of 1244 1976 cmd.exe 46 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1872 takeown.exe 1908 icacls.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Network:bin 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe -
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes itself 1 IoCs
pid Process 1976 cmd.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 556 vssadmin.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1872 takeown.exe 1908 icacls.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 892 Network:bin 1144 Network.exe 1492 30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe 892 Network:bin 1144 Network.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1028 vssvc.exe Token: SeRestorePrivilege 1028 vssvc.exe Token: SeAuditPrivilege 1028 vssvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Network.exe Network:bin File opened for modification C:\Windows\SysWOW64\Network.exe attrib.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1244 attrib.exe 2016 attrib.exe 2000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe"C:\Users\Admin\AppData\Local\Temp\30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- NTFS ADS
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1492 -
C:\Users\Admin\AppData\Roaming\Network:binC:\Users\Admin\AppData\Roaming\Network:bin -r2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in System32 directory
PID:892 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:556
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Network.exe3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1872
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Network.exe /reset3⤵
- Modifies file permissions
- Possible privilege escalation attempt
PID:1908
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Network" & del "C:\Users\Admin\AppData\Roaming\Network"3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1936
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Network"4⤵
- Views/modifies file attributes
PID:2000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe" & del "C:\Users\Admin\AppData\Local\Temp\30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe"2⤵
- Suspicious use of WriteProcessMemory
- Deletes itself
PID:1976 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2036
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\30af561ec0b6d4a37654f9838750abde60d0d38e2370bb250007eb946425add0.exe"3⤵
- Views/modifies file attributes
PID:1244
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
C:\Windows\SysWOW64\Network.exeC:\Windows\SysWOW64\Network.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1144 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Network.exe" & del "C:\Windows\SysWOW64\Network.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1540
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Network.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2016
-
-