Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03/11/2020, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe
Resource
win10v20201028
General
-
Target
ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe
-
Size
58KB
-
MD5
33b80a574c6441baf5409a292aafb1cf
-
SHA1
8048aba11ea6209d1f49fa4e12741050350557df
-
SHA256
ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56
-
SHA512
52843695c364814c0d0d375f68f9c7202a26e492f59c01eaf23dd366da443ae6a02c2a7ff1748a033658808e900a61e097deb95c98de3744f2767faa040ddc00
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1848 Co:bin 1492 Co.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\MergeCheckpoint.crw.garminwasted Co.exe File created C:\Users\Admin\Pictures\CheckpointComplete.tif.garminwasted_info Co.exe File created C:\Users\Admin\Pictures\DismountCheckpoint.tiff.garminwasted_info Co.exe File opened for modification C:\Users\Admin\Pictures\DismountCheckpoint.tiff.garminwasted Co.exe File created C:\Users\Admin\Pictures\MergeCheckpoint.crw.garminwasted_info Co.exe File renamed C:\Users\Admin\Pictures\MergeCheckpoint.crw => C:\Users\Admin\Pictures\MergeCheckpoint.crw.garminwasted Co.exe File renamed C:\Users\Admin\Pictures\CheckpointComplete.tif => C:\Users\Admin\Pictures\CheckpointComplete.tif.garminwasted Co.exe File opened for modification C:\Users\Admin\Pictures\CheckpointComplete.tif.garminwasted Co.exe File renamed C:\Users\Admin\Pictures\DismountCheckpoint.tiff => C:\Users\Admin\Pictures\DismountCheckpoint.tiff.garminwasted Co.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1768 takeown.exe 1284 icacls.exe -
Deletes itself 1 IoCs
pid Process 1660 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1768 takeown.exe 1284 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Co.exe Co:bin File opened for modification C:\Windows\SysWOW64\Co.exe attrib.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1988 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Co:bin ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1320 vssvc.exe Token: SeRestorePrivilege 1320 vssvc.exe Token: SeAuditPrivilege 1320 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 336 wrote to memory of 1848 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 26 PID 336 wrote to memory of 1848 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 26 PID 336 wrote to memory of 1848 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 26 PID 336 wrote to memory of 1848 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 26 PID 1848 wrote to memory of 1988 1848 Co:bin 27 PID 1848 wrote to memory of 1988 1848 Co:bin 27 PID 1848 wrote to memory of 1988 1848 Co:bin 27 PID 1848 wrote to memory of 1988 1848 Co:bin 27 PID 1848 wrote to memory of 1768 1848 Co:bin 31 PID 1848 wrote to memory of 1768 1848 Co:bin 31 PID 1848 wrote to memory of 1768 1848 Co:bin 31 PID 1848 wrote to memory of 1768 1848 Co:bin 31 PID 1848 wrote to memory of 1284 1848 Co:bin 33 PID 1848 wrote to memory of 1284 1848 Co:bin 33 PID 1848 wrote to memory of 1284 1848 Co:bin 33 PID 1848 wrote to memory of 1284 1848 Co:bin 33 PID 1492 wrote to memory of 888 1492 Co.exe 37 PID 1492 wrote to memory of 888 1492 Co.exe 37 PID 1492 wrote to memory of 888 1492 Co.exe 37 PID 1492 wrote to memory of 888 1492 Co.exe 37 PID 888 wrote to memory of 1460 888 cmd.exe 39 PID 888 wrote to memory of 1460 888 cmd.exe 39 PID 888 wrote to memory of 1460 888 cmd.exe 39 PID 888 wrote to memory of 1460 888 cmd.exe 39 PID 1848 wrote to memory of 2032 1848 Co:bin 43 PID 1848 wrote to memory of 2032 1848 Co:bin 43 PID 1848 wrote to memory of 2032 1848 Co:bin 43 PID 1848 wrote to memory of 2032 1848 Co:bin 43 PID 336 wrote to memory of 1660 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 44 PID 336 wrote to memory of 1660 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 44 PID 336 wrote to memory of 1660 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 44 PID 336 wrote to memory of 1660 336 ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe 44 PID 2032 wrote to memory of 1640 2032 cmd.exe 47 PID 2032 wrote to memory of 1640 2032 cmd.exe 47 PID 2032 wrote to memory of 1640 2032 cmd.exe 47 PID 2032 wrote to memory of 1640 2032 cmd.exe 47 PID 1660 wrote to memory of 1628 1660 cmd.exe 48 PID 1660 wrote to memory of 1628 1660 cmd.exe 48 PID 1660 wrote to memory of 1628 1660 cmd.exe 48 PID 1660 wrote to memory of 1628 1660 cmd.exe 48 PID 888 wrote to memory of 1468 888 cmd.exe 49 PID 888 wrote to memory of 1468 888 cmd.exe 49 PID 888 wrote to memory of 1468 888 cmd.exe 49 PID 888 wrote to memory of 1468 888 cmd.exe 49 PID 2032 wrote to memory of 1388 2032 cmd.exe 50 PID 2032 wrote to memory of 1388 2032 cmd.exe 50 PID 2032 wrote to memory of 1388 2032 cmd.exe 50 PID 2032 wrote to memory of 1388 2032 cmd.exe 50 PID 1660 wrote to memory of 1692 1660 cmd.exe 51 PID 1660 wrote to memory of 1692 1660 cmd.exe 51 PID 1660 wrote to memory of 1692 1660 cmd.exe 51 PID 1660 wrote to memory of 1692 1660 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1468 attrib.exe 1388 attrib.exe 1692 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe"C:\Users\Admin\AppData\Local\Temp\ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Roaming\Co:binC:\Users\Admin\AppData\Roaming\Co:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1988
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Co.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1768
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Co.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1284
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Co" & del "C:\Users\Admin\AppData\Roaming\Co"3⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1640
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Co"4⤵
- Views/modifies file attributes
PID:1388
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe" & del "C:\Users\Admin\AppData\Local\Temp\ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1628
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\ab007094afec534a2aa64436f214866014a664e7399aeaf361790ede5eec6b56.bin.exe"3⤵
- Views/modifies file attributes
PID:1692
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
C:\Windows\SysWOW64\Co.exeC:\Windows\SysWOW64\Co.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Co.exe" & del "C:\Windows\SysWOW64\Co.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1460
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Co.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1468
-
-