Analysis
-
max time kernel
22s -
max time network
18s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-11-2020 14:20
Static task
static1
Behavioral task
behavioral1
Sample
7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe
Resource
win10v20201028
General
-
Target
7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe
-
Size
58KB
-
MD5
432a1dd2d40e5b0f6385096847efd3b2
-
SHA1
f5735932baf8b04a8e1ca622ff06d37a9db29d9f
-
SHA256
7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559
-
SHA512
0d713fa5ca52322ea2295d305adbcecc83aaf6b46024987a483112fbbc4c47db6695d0e019b7e68f1a8fe53ff4cbbb4010a981a3fa91eb9be42ebccc75118c1e
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1344 Snmp:bin 1724 Snmp.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UpdateGrant.crw => C:\Users\Admin\Pictures\UpdateGrant.crw.garminwasted Snmp.exe File opened for modification C:\Users\Admin\Pictures\UpdateGrant.crw.garminwasted Snmp.exe File created C:\Users\Admin\Pictures\MergeFormat.raw.garminwasted_info Snmp.exe File renamed C:\Users\Admin\Pictures\MergeFormat.raw => C:\Users\Admin\Pictures\MergeFormat.raw.garminwasted Snmp.exe File opened for modification C:\Users\Admin\Pictures\MergeFormat.raw.garminwasted Snmp.exe File created C:\Users\Admin\Pictures\UpdateGrant.crw.garminwasted_info Snmp.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1632 takeown.exe 644 icacls.exe -
Deletes itself 1 IoCs
pid Process 616 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1632 takeown.exe 644 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Snmp.exe Snmp:bin File opened for modification C:\Windows\SysWOW64\Snmp.exe attrib.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1448 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Snmp:bin 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1144 vssvc.exe Token: SeRestorePrivilege 1144 vssvc.exe Token: SeAuditPrivilege 1144 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1344 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 26 PID 1892 wrote to memory of 1344 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 26 PID 1892 wrote to memory of 1344 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 26 PID 1892 wrote to memory of 1344 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 26 PID 1344 wrote to memory of 1448 1344 Snmp:bin 27 PID 1344 wrote to memory of 1448 1344 Snmp:bin 27 PID 1344 wrote to memory of 1448 1344 Snmp:bin 27 PID 1344 wrote to memory of 1448 1344 Snmp:bin 27 PID 1344 wrote to memory of 1632 1344 Snmp:bin 31 PID 1344 wrote to memory of 1632 1344 Snmp:bin 31 PID 1344 wrote to memory of 1632 1344 Snmp:bin 31 PID 1344 wrote to memory of 1632 1344 Snmp:bin 31 PID 1344 wrote to memory of 644 1344 Snmp:bin 33 PID 1344 wrote to memory of 644 1344 Snmp:bin 33 PID 1344 wrote to memory of 644 1344 Snmp:bin 33 PID 1344 wrote to memory of 644 1344 Snmp:bin 33 PID 1724 wrote to memory of 396 1724 Snmp.exe 37 PID 1724 wrote to memory of 396 1724 Snmp.exe 37 PID 1724 wrote to memory of 396 1724 Snmp.exe 37 PID 1724 wrote to memory of 396 1724 Snmp.exe 37 PID 396 wrote to memory of 576 396 cmd.exe 39 PID 396 wrote to memory of 576 396 cmd.exe 39 PID 396 wrote to memory of 576 396 cmd.exe 39 PID 396 wrote to memory of 576 396 cmd.exe 39 PID 1344 wrote to memory of 852 1344 Snmp:bin 40 PID 1344 wrote to memory of 852 1344 Snmp:bin 40 PID 1344 wrote to memory of 852 1344 Snmp:bin 40 PID 1344 wrote to memory of 852 1344 Snmp:bin 40 PID 1892 wrote to memory of 616 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 41 PID 1892 wrote to memory of 616 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 41 PID 1892 wrote to memory of 616 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 41 PID 1892 wrote to memory of 616 1892 7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe 41 PID 852 wrote to memory of 848 852 cmd.exe 44 PID 852 wrote to memory of 848 852 cmd.exe 44 PID 852 wrote to memory of 848 852 cmd.exe 44 PID 852 wrote to memory of 848 852 cmd.exe 44 PID 616 wrote to memory of 1548 616 cmd.exe 45 PID 616 wrote to memory of 1548 616 cmd.exe 45 PID 616 wrote to memory of 1548 616 cmd.exe 45 PID 616 wrote to memory of 1548 616 cmd.exe 45 PID 396 wrote to memory of 1848 396 cmd.exe 49 PID 396 wrote to memory of 1848 396 cmd.exe 49 PID 396 wrote to memory of 1848 396 cmd.exe 49 PID 396 wrote to memory of 1848 396 cmd.exe 49 PID 852 wrote to memory of 1844 852 cmd.exe 50 PID 852 wrote to memory of 1844 852 cmd.exe 50 PID 852 wrote to memory of 1844 852 cmd.exe 50 PID 852 wrote to memory of 1844 852 cmd.exe 50 PID 616 wrote to memory of 1780 616 cmd.exe 51 PID 616 wrote to memory of 1780 616 cmd.exe 51 PID 616 wrote to memory of 1780 616 cmd.exe 51 PID 616 wrote to memory of 1780 616 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1844 attrib.exe 1780 attrib.exe 1848 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe"C:\Users\Admin\AppData\Local\Temp\7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\Snmp:binC:\Users\Admin\AppData\Roaming\Snmp:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1448
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Snmp.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1632
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Snmp.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:644
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Snmp" & del "C:\Users\Admin\AppData\Roaming\Snmp"3⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:848
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Snmp"4⤵
- Views/modifies file attributes
PID:1844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe" & del "C:\Users\Admin\AppData\Local\Temp\7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1548
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\7de425238719622bf2b2150591631b0a71d6a5dade419a4e67b9bdbfa272b559.bin.exe"3⤵
- Views/modifies file attributes
PID:1780
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
C:\Windows\SysWOW64\Snmp.exeC:\Windows\SysWOW64\Snmp.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Snmp.exe" & del "C:\Windows\SysWOW64\Snmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:576
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Snmp.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1848
-
-