Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
110s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
31/08/2020, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
wastlock_1.exe
Resource
win7
Behavioral task
behavioral2
Sample
wastlock_1.exe
Resource
win10v200722
General
-
Target
wastlock_1.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 3564 Wallet:bin 500 Wallet.exe -
Modifies extensions of user files 33 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompleteConvertTo.crw.rlhwasted_info Wallet.exe File created C:\Users\Admin\Pictures\InstallUnblock.raw.rlhwasted_info Wallet.exe File opened for modification C:\Users\Admin\Pictures\SavePush.raw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\ImportResolve.png.rlhwasted_info Wallet.exe File opened for modification C:\Users\Admin\Pictures\ImportResolve.png.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\SavePush.raw.rlhwasted_info Wallet.exe File opened for modification C:\Users\Admin\Pictures\CompleteConvertTo.crw.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\EnableSend.tif => C:\Users\Admin\Pictures\EnableSend.tif.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\EnableSend.tif.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\ImportResolve.png => C:\Users\Admin\Pictures\ImportResolve.png.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\InstallUnblock.raw => C:\Users\Admin\Pictures\InstallUnblock.raw.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\ResolveLimit.raw => C:\Users\Admin\Pictures\ResolveLimit.raw.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\ShowOpen.png.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\DismountNew.crw => C:\Users\Admin\Pictures\DismountNew.crw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\FindUnblock.tif.rlhwasted_info Wallet.exe File created C:\Users\Admin\Pictures\EnableFormat.raw.rlhwasted_info Wallet.exe File renamed C:\Users\Admin\Pictures\EnableFormat.raw => C:\Users\Admin\Pictures\EnableFormat.raw.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\EnableFormat.raw.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\FindUnblock.tif => C:\Users\Admin\Pictures\FindUnblock.tif.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\InstallUnblock.raw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\ResolveLimit.raw.rlhwasted_info Wallet.exe File opened for modification C:\Users\Admin\Pictures\ResolveLimit.raw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\CompleteRead.raw.rlhwasted_info Wallet.exe File renamed C:\Users\Admin\Pictures\CompleteRead.raw => C:\Users\Admin\Pictures\CompleteRead.raw.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\CompleteRead.raw.rlhwasted Wallet.exe File opened for modification C:\Users\Admin\Pictures\DismountNew.crw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\EnableSend.tif.rlhwasted_info Wallet.exe File created C:\Users\Admin\Pictures\ShowOpen.png.rlhwasted_info Wallet.exe File renamed C:\Users\Admin\Pictures\ShowOpen.png => C:\Users\Admin\Pictures\ShowOpen.png.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\CompleteConvertTo.crw => C:\Users\Admin\Pictures\CompleteConvertTo.crw.rlhwasted Wallet.exe File created C:\Users\Admin\Pictures\DismountNew.crw.rlhwasted_info Wallet.exe File opened for modification C:\Users\Admin\Pictures\FindUnblock.tif.rlhwasted Wallet.exe File renamed C:\Users\Admin\Pictures\SavePush.raw => C:\Users\Admin\Pictures\SavePush.raw.rlhwasted Wallet.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3152 takeown.exe 3324 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3152 takeown.exe 3324 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Wallet.exe Wallet:bin File opened for modification C:\Windows\SysWOW64\Wallet.exe attrib.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3960 vssadmin.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = cedf2c24d47fd601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Wallet:bin wastlock_1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 868 svchost.exe Token: SeCreatePagefilePrivilege 868 svchost.exe Token: SeBackupPrivilege 3500 vssvc.exe Token: SeRestorePrivilege 3500 vssvc.exe Token: SeAuditPrivilege 3500 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 648 wrote to memory of 3564 648 wastlock_1.exe 72 PID 648 wrote to memory of 3564 648 wastlock_1.exe 72 PID 648 wrote to memory of 3564 648 wastlock_1.exe 72 PID 3564 wrote to memory of 3960 3564 Wallet:bin 75 PID 3564 wrote to memory of 3960 3564 Wallet:bin 75 PID 3564 wrote to memory of 3152 3564 Wallet:bin 79 PID 3564 wrote to memory of 3152 3564 Wallet:bin 79 PID 3564 wrote to memory of 3152 3564 Wallet:bin 79 PID 3564 wrote to memory of 3324 3564 Wallet:bin 82 PID 3564 wrote to memory of 3324 3564 Wallet:bin 82 PID 3564 wrote to memory of 3324 3564 Wallet:bin 82 PID 500 wrote to memory of 2868 500 Wallet.exe 86 PID 500 wrote to memory of 2868 500 Wallet.exe 86 PID 500 wrote to memory of 2868 500 Wallet.exe 86 PID 2868 wrote to memory of 2348 2868 cmd.exe 88 PID 2868 wrote to memory of 2348 2868 cmd.exe 88 PID 2868 wrote to memory of 2348 2868 cmd.exe 88 PID 3564 wrote to memory of 3576 3564 Wallet:bin 89 PID 3564 wrote to memory of 3576 3564 Wallet:bin 89 PID 3564 wrote to memory of 3576 3564 Wallet:bin 89 PID 648 wrote to memory of 4048 648 wastlock_1.exe 91 PID 648 wrote to memory of 4048 648 wastlock_1.exe 91 PID 648 wrote to memory of 4048 648 wastlock_1.exe 91 PID 3576 wrote to memory of 1176 3576 cmd.exe 93 PID 3576 wrote to memory of 1176 3576 cmd.exe 93 PID 3576 wrote to memory of 1176 3576 cmd.exe 93 PID 4048 wrote to memory of 2212 4048 cmd.exe 94 PID 4048 wrote to memory of 2212 4048 cmd.exe 94 PID 4048 wrote to memory of 2212 4048 cmd.exe 94 PID 2868 wrote to memory of 3024 2868 cmd.exe 96 PID 2868 wrote to memory of 3024 2868 cmd.exe 96 PID 2868 wrote to memory of 3024 2868 cmd.exe 96 PID 4048 wrote to memory of 252 4048 cmd.exe 97 PID 4048 wrote to memory of 252 4048 cmd.exe 97 PID 4048 wrote to memory of 252 4048 cmd.exe 97 PID 3576 wrote to memory of 276 3576 cmd.exe 98 PID 3576 wrote to memory of 276 3576 cmd.exe 98 PID 3576 wrote to memory of 276 3576 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3024 attrib.exe 252 attrib.exe 276 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wastlock_1.exe"C:\Users\Admin\AppData\Local\Temp\wastlock_1.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Roaming\Wallet:binC:\Users\Admin\AppData\Roaming\Wallet:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:3960
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Wallet.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3152
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Wallet.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3324
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Wallet" & del "C:\Users\Admin\AppData\Roaming\Wallet"3⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1176
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Wallet"4⤵
- Views/modifies file attributes
PID:276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\wastlock_1.exe" & del "C:\Users\Admin\AppData\Local\Temp\wastlock_1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2212
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\wastlock_1.exe"3⤵
- Views/modifies file attributes
PID:252
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:868
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
C:\Windows\SysWOW64\Wallet.exeC:\Windows\SysWOW64\Wallet.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Wallet.exe" & del "C:\Windows\SysWOW64\Wallet.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2348
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Wallet.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:3024
-
-