Analysis
-
max time kernel
78s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-11-2020 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
Resource
win10v20201028
General
-
Target
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe
-
Size
60KB
-
MD5
2000de399f4c0ad50a26780700ed6cac
-
SHA1
70c0d6b0a8485df01ed893a7919009f099591083
-
SHA256
7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a
-
SHA512
378cfc46bb17be59975c29e19cb08d5c899eb088639b3446470e286c831ef4f71179316e0c8cbfad8bcc6d77c6dc5cb3ec96690a9a0a0646e69edcd3648e340b
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 4032 Ci:bin 2580 Ci.exe -
Modifies extensions of user files 27 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ClearReceive.raw.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\CompressInstall.tiff.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\CompressInstall.tiff => C:\Users\Admin\Pictures\CompressInstall.tiff.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\ImportRevoke.crw.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\ImportUnlock.tif.rlhwasted_info Ci.exe File created C:\Users\Admin\Pictures\ShowTrace.png.rlhwasted_info Ci.exe File opened for modification C:\Users\Admin\Pictures\UnblockFormat.tiff.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\ApproveMount.png.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\ApproveMount.png => C:\Users\Admin\Pictures\ApproveMount.png.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\ImportRevoke.crw.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\ImportRevoke.crw => C:\Users\Admin\Pictures\ImportRevoke.crw.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\InstallStep.crw.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\InstallStep.crw => C:\Users\Admin\Pictures\InstallStep.crw.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\UnblockFormat.tiff.rlhwasted_info Ci.exe File opened for modification C:\Users\Admin\Pictures\CompressInstall.tiff.rlhwasted Ci.exe File renamed C:\Users\Admin\Pictures\DisableUnpublish.raw => C:\Users\Admin\Pictures\DisableUnpublish.raw.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\ImportUnlock.tif.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\ClearReceive.raw.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\ClearReceive.raw => C:\Users\Admin\Pictures\ClearReceive.raw.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\DisableUnpublish.raw.rlhwasted Ci.exe File renamed C:\Users\Admin\Pictures\ShowTrace.png => C:\Users\Admin\Pictures\ShowTrace.png.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\ShowTrace.png.rlhwasted Ci.exe File renamed C:\Users\Admin\Pictures\UnblockFormat.tiff => C:\Users\Admin\Pictures\UnblockFormat.tiff.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\ApproveMount.png.rlhwasted Ci.exe File created C:\Users\Admin\Pictures\DisableUnpublish.raw.rlhwasted_info Ci.exe File renamed C:\Users\Admin\Pictures\ImportUnlock.tif => C:\Users\Admin\Pictures\ImportUnlock.tif.rlhwasted Ci.exe File opened for modification C:\Users\Admin\Pictures\InstallStep.crw.rlhwasted Ci.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3744 takeown.exe 1020 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3744 takeown.exe 1020 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ci.exe Ci:bin File opened for modification C:\Windows\SysWOW64\Ci.exe attrib.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3460 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Ci:bin 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 3856 vssvc.exe Token: SeRestorePrivilege 3856 vssvc.exe Token: SeAuditPrivilege 3856 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4032 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 75 PID 3304 wrote to memory of 4032 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 75 PID 3304 wrote to memory of 4032 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 75 PID 4032 wrote to memory of 3460 4032 Ci:bin 76 PID 4032 wrote to memory of 3460 4032 Ci:bin 76 PID 4032 wrote to memory of 3744 4032 Ci:bin 80 PID 4032 wrote to memory of 3744 4032 Ci:bin 80 PID 4032 wrote to memory of 3744 4032 Ci:bin 80 PID 4032 wrote to memory of 1020 4032 Ci:bin 82 PID 4032 wrote to memory of 1020 4032 Ci:bin 82 PID 4032 wrote to memory of 1020 4032 Ci:bin 82 PID 2580 wrote to memory of 3864 2580 Ci.exe 85 PID 2580 wrote to memory of 3864 2580 Ci.exe 85 PID 2580 wrote to memory of 3864 2580 Ci.exe 85 PID 3864 wrote to memory of 2264 3864 cmd.exe 87 PID 3864 wrote to memory of 2264 3864 cmd.exe 87 PID 3864 wrote to memory of 2264 3864 cmd.exe 87 PID 4032 wrote to memory of 1940 4032 Ci:bin 88 PID 4032 wrote to memory of 1940 4032 Ci:bin 88 PID 4032 wrote to memory of 1940 4032 Ci:bin 88 PID 3304 wrote to memory of 1280 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 90 PID 3304 wrote to memory of 1280 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 90 PID 3304 wrote to memory of 1280 3304 7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe 90 PID 1940 wrote to memory of 4004 1940 cmd.exe 92 PID 1940 wrote to memory of 4004 1940 cmd.exe 92 PID 1940 wrote to memory of 4004 1940 cmd.exe 92 PID 1280 wrote to memory of 980 1280 cmd.exe 93 PID 1280 wrote to memory of 980 1280 cmd.exe 93 PID 1280 wrote to memory of 980 1280 cmd.exe 93 PID 3864 wrote to memory of 3292 3864 cmd.exe 98 PID 3864 wrote to memory of 3292 3864 cmd.exe 98 PID 3864 wrote to memory of 3292 3864 cmd.exe 98 PID 1940 wrote to memory of 2792 1940 cmd.exe 99 PID 1940 wrote to memory of 2792 1940 cmd.exe 99 PID 1940 wrote to memory of 2792 1940 cmd.exe 99 PID 1280 wrote to memory of 4028 1280 cmd.exe 100 PID 1280 wrote to memory of 4028 1280 cmd.exe 100 PID 1280 wrote to memory of 4028 1280 cmd.exe 100 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2792 attrib.exe 4028 attrib.exe 3292 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Roaming\Ci:binC:\Users\Admin\AppData\Roaming\Ci:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:3460
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Ci.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3744
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Ci.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Ci" & del "C:\Users\Admin\AppData\Roaming\Ci"3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:4004
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Ci"4⤵
- Views/modifies file attributes
PID:2792
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe" & del "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:980
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\7a45a4ae68992e5be784b4a6da7acd98dc28281fe238f22c1f7c1d85a90d144a.bin.exe"3⤵
- Views/modifies file attributes
PID:4028
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
C:\Windows\SysWOW64\Ci.exeC:\Windows\SysWOW64\Ci.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Ci.exe" & del "C:\Windows\SysWOW64\Ci.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2264
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Ci.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:3292
-
-