Analysis
-
max time kernel
76s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
02-09-2020 18:23
Static task
static1
Behavioral task
behavioral1
Sample
Sample_5f2c5184b9ca450019d4b155.false.exe
Resource
win7
Behavioral task
behavioral2
Sample
Sample_5f2c5184b9ca450019d4b155.false.exe
Resource
win10v200722
General
-
Target
Sample_5f2c5184b9ca450019d4b155.false.exe
-
Size
1.2MB
-
MD5
72aa9ab7c9d740aa4e1a554fe2e53d53
-
SHA1
476741067c0a95bf7b4b4589f30f0046cd3a14be
-
SHA256
d5b5a063656f2ce6dc50ed24278a2d21f2bb762c8e65c0d2ffc2477986896acf
-
SHA512
1c5440f5f6ac7cb6a489d32c035924e9446e5808b96a7922c249da15070ef3694001d8c09726d521edba5f41cbb5c1564fe122bf1565a80f290f745f3ac660ab
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2164 Product:bin 3780 Product.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SplitMerge.tiff.howto_seccrypt Product.exe File renamed C:\Users\Admin\Pictures\SplitMerge.tiff => C:\Users\Admin\Pictures\SplitMerge.tiff.seccrypt Product.exe File opened for modification C:\Users\Admin\Pictures\SplitMerge.tiff.seccrypt Product.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2428 takeown.exe 3004 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2428 takeown.exe 3004 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Product.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Product.exe Product:bin -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1404 vssadmin.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 1df8066f6681d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Product:bin Sample_5f2c5184b9ca450019d4b155.false.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 508 svchost.exe Token: SeCreatePagefilePrivilege 508 svchost.exe Token: SeBackupPrivilege 1932 vssvc.exe Token: SeRestorePrivilege 1932 vssvc.exe Token: SeAuditPrivilege 1932 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2164 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 72 PID 3888 wrote to memory of 2164 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 72 PID 3888 wrote to memory of 2164 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 72 PID 2164 wrote to memory of 1404 2164 Product:bin 74 PID 2164 wrote to memory of 1404 2164 Product:bin 74 PID 2164 wrote to memory of 2428 2164 Product:bin 79 PID 2164 wrote to memory of 2428 2164 Product:bin 79 PID 2164 wrote to memory of 2428 2164 Product:bin 79 PID 2164 wrote to memory of 3004 2164 Product:bin 81 PID 2164 wrote to memory of 3004 2164 Product:bin 81 PID 2164 wrote to memory of 3004 2164 Product:bin 81 PID 3780 wrote to memory of 932 3780 Product.exe 86 PID 3780 wrote to memory of 932 3780 Product.exe 86 PID 3780 wrote to memory of 932 3780 Product.exe 86 PID 932 wrote to memory of 3480 932 cmd.exe 88 PID 932 wrote to memory of 3480 932 cmd.exe 88 PID 932 wrote to memory of 3480 932 cmd.exe 88 PID 2164 wrote to memory of 4028 2164 Product:bin 89 PID 2164 wrote to memory of 4028 2164 Product:bin 89 PID 2164 wrote to memory of 4028 2164 Product:bin 89 PID 3888 wrote to memory of 752 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 91 PID 3888 wrote to memory of 752 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 91 PID 3888 wrote to memory of 752 3888 Sample_5f2c5184b9ca450019d4b155.false.exe 91 PID 752 wrote to memory of 1280 752 cmd.exe 93 PID 752 wrote to memory of 1280 752 cmd.exe 93 PID 752 wrote to memory of 1280 752 cmd.exe 93 PID 4028 wrote to memory of 1264 4028 cmd.exe 94 PID 4028 wrote to memory of 1264 4028 cmd.exe 94 PID 4028 wrote to memory of 1264 4028 cmd.exe 94 PID 932 wrote to memory of 248 932 cmd.exe 96 PID 932 wrote to memory of 248 932 cmd.exe 96 PID 932 wrote to memory of 248 932 cmd.exe 96 PID 4028 wrote to memory of 268 4028 cmd.exe 97 PID 4028 wrote to memory of 268 4028 cmd.exe 97 PID 4028 wrote to memory of 268 4028 cmd.exe 97 PID 752 wrote to memory of 1716 752 cmd.exe 98 PID 752 wrote to memory of 1716 752 cmd.exe 98 PID 752 wrote to memory of 1716 752 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 248 attrib.exe 268 attrib.exe 1716 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sample_5f2c5184b9ca450019d4b155.false.exe"C:\Users\Admin\AppData\Local\Temp\Sample_5f2c5184b9ca450019d4b155.false.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Roaming\Product:binC:\Users\Admin\AppData\Roaming\Product:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1404
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Product.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2428
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Product.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Product" & del "C:\Users\Admin\AppData\Roaming\Product"3⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1264
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Product"4⤵
- Views/modifies file attributes
PID:268
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\Sample_5f2c5184b9ca450019d4b155.false.exe" & del "C:\Users\Admin\AppData\Local\Temp\Sample_5f2c5184b9ca450019d4b155.false.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1280
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\Sample_5f2c5184b9ca450019d4b155.false.exe"3⤵
- Views/modifies file attributes
PID:1716
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:508
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Windows\SysWOW64\Product.exeC:\Windows\SysWOW64\Product.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Product.exe" & del "C:\Windows\SysWOW64\Product.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:3480
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Product.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:248
-
-