Analysis
-
max time kernel
21s -
max time network
21s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03/11/2020, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
Resource
win10v20201028
General
-
Target
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
-
Size
60KB
-
MD5
2000de399f4c0ad50a26780700ed6cac
-
SHA1
70c0d6b0a8485df01ed893a7919009f099591083
-
SHA256
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a
-
SHA512
378cfc46bb17be59975c29e19cb08d5c899eb088639b3446470e286c831ef4f71179316e0c8cbfad8bcc6d77c6dc5cb3ec96690a9a0a0646e69edcd3648e340b
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2020 Rtl:bin 1536 Rtl.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertToClear.crw.rlhwasted Rtl.exe File created C:\Users\Admin\Pictures\ConvertToClear.crw.rlhwasted_info Rtl.exe File renamed C:\Users\Admin\Pictures\ConvertToClear.crw => C:\Users\Admin\Pictures\ConvertToClear.crw.rlhwasted Rtl.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1448 takeown.exe 904 icacls.exe -
Deletes itself 1 IoCs
pid Process 616 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1448 takeown.exe 904 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Rtl.exe attrib.exe File opened for modification C:\Windows\SysWOW64\Rtl.exe Rtl:bin -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1968 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Rtl:bin 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1832 vssvc.exe Token: SeRestorePrivilege 1832 vssvc.exe Token: SeAuditPrivilege 1832 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 292 wrote to memory of 2020 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 26 PID 292 wrote to memory of 2020 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 26 PID 292 wrote to memory of 2020 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 26 PID 292 wrote to memory of 2020 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 26 PID 2020 wrote to memory of 1968 2020 Rtl:bin 27 PID 2020 wrote to memory of 1968 2020 Rtl:bin 27 PID 2020 wrote to memory of 1968 2020 Rtl:bin 27 PID 2020 wrote to memory of 1968 2020 Rtl:bin 27 PID 2020 wrote to memory of 1448 2020 Rtl:bin 31 PID 2020 wrote to memory of 1448 2020 Rtl:bin 31 PID 2020 wrote to memory of 1448 2020 Rtl:bin 31 PID 2020 wrote to memory of 1448 2020 Rtl:bin 31 PID 2020 wrote to memory of 904 2020 Rtl:bin 33 PID 2020 wrote to memory of 904 2020 Rtl:bin 33 PID 2020 wrote to memory of 904 2020 Rtl:bin 33 PID 2020 wrote to memory of 904 2020 Rtl:bin 33 PID 1536 wrote to memory of 1112 1536 Rtl.exe 37 PID 1536 wrote to memory of 1112 1536 Rtl.exe 37 PID 1536 wrote to memory of 1112 1536 Rtl.exe 37 PID 1536 wrote to memory of 1112 1536 Rtl.exe 37 PID 1112 wrote to memory of 844 1112 cmd.exe 39 PID 1112 wrote to memory of 844 1112 cmd.exe 39 PID 1112 wrote to memory of 844 1112 cmd.exe 39 PID 1112 wrote to memory of 844 1112 cmd.exe 39 PID 2020 wrote to memory of 816 2020 Rtl:bin 40 PID 2020 wrote to memory of 816 2020 Rtl:bin 40 PID 2020 wrote to memory of 816 2020 Rtl:bin 40 PID 2020 wrote to memory of 816 2020 Rtl:bin 40 PID 292 wrote to memory of 616 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 42 PID 292 wrote to memory of 616 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 42 PID 292 wrote to memory of 616 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 42 PID 292 wrote to memory of 616 292 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 42 PID 816 wrote to memory of 948 816 cmd.exe 44 PID 816 wrote to memory of 948 816 cmd.exe 44 PID 816 wrote to memory of 948 816 cmd.exe 44 PID 816 wrote to memory of 948 816 cmd.exe 44 PID 616 wrote to memory of 1560 616 cmd.exe 45 PID 616 wrote to memory of 1560 616 cmd.exe 45 PID 616 wrote to memory of 1560 616 cmd.exe 45 PID 616 wrote to memory of 1560 616 cmd.exe 45 PID 1112 wrote to memory of 1336 1112 cmd.exe 49 PID 1112 wrote to memory of 1336 1112 cmd.exe 49 PID 1112 wrote to memory of 1336 1112 cmd.exe 49 PID 1112 wrote to memory of 1336 1112 cmd.exe 49 PID 616 wrote to memory of 1232 616 cmd.exe 50 PID 616 wrote to memory of 1232 616 cmd.exe 50 PID 616 wrote to memory of 1232 616 cmd.exe 50 PID 616 wrote to memory of 1232 616 cmd.exe 50 PID 816 wrote to memory of 1212 816 cmd.exe 51 PID 816 wrote to memory of 1212 816 cmd.exe 51 PID 816 wrote to memory of 1212 816 cmd.exe 51 PID 816 wrote to memory of 1212 816 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1232 attrib.exe 1212 attrib.exe 1336 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Roaming\Rtl:binC:\Users\Admin\AppData\Roaming\Rtl:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1968
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Rtl.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1448
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Rtl.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:904
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Rtl" & del "C:\Users\Admin\AppData\Roaming\Rtl"3⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:948
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Rtl"4⤵
- Views/modifies file attributes
PID:1212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe" & del "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1560
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"3⤵
- Views/modifies file attributes
PID:1232
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
C:\Windows\SysWOW64\Rtl.exeC:\Windows\SysWOW64\Rtl.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Rtl.exe" & del "C:\Windows\SysWOW64\Rtl.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:844
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Rtl.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1336
-
-