Analysis
-
max time kernel
66s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14/03/2021, 08:54
Behavioral task
behavioral1
Sample
82d841869e912a772413bb37f30307b0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
82d841869e912a772413bb37f30307b0.exe
Resource
win10v20201028
General
-
Target
82d841869e912a772413bb37f30307b0.exe
-
Size
1.2MB
-
MD5
82d841869e912a772413bb37f30307b0
-
SHA1
b75ab0170c1206c345d2fb82506e816098328ee8
-
SHA256
db665f26dbc4ca92d326f2cb98faafb9e84d404346b201cd88bec91ce4206bb2
-
SHA512
48078796a9aa03e685bebd14539586c099f30c3a1e18639d4acb810dc3bbb0dc14b09066797e79c34dcd91a120b08537aadf228585e226101384ade3fe2252c6
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
resource yara_rule behavioral1/files/0x00040000000130f1-6.dat cryptone behavioral1/files/0x00040000000130f1-13.dat cryptone behavioral1/files/0x0005000000005668-15.dat cryptone behavioral1/files/0x0005000000005668-17.dat cryptone -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 2036 Nsi:bin 1180 Nsi.exe -
Modifies extensions of user files 27 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\RemoveMount.png.howto_seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\RequestGet.raw => C:\Users\Admin\Pictures\RequestGet.raw.seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\RequestGet.raw.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\ConnectUninstall.tif => C:\Users\Admin\Pictures\ConnectUninstall.tif.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\ReceiveRedo.tif.howto_seccrypt Nsi.exe File created C:\Users\Admin\Pictures\ConnectUninstall.tif.howto_seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\DebugTest.tiff.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\UnlockResolve.tif => C:\Users\Admin\Pictures\UnlockResolve.tif.seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\MergeEnable.raw.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\StartReset.crw.howto_seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\UnlockResolve.tif.seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\ConnectUninstall.tif.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\MergeEnable.raw.howto_seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\RemoveMount.png.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\UnlockResolve.tif.howto_seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\HideNew.png => C:\Users\Admin\Pictures\HideNew.png.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\MergeEnable.raw => C:\Users\Admin\Pictures\MergeEnable.raw.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\RequestGet.raw.howto_seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\RemoveMount.png => C:\Users\Admin\Pictures\RemoveMount.png.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\DebugTest.tiff => C:\Users\Admin\Pictures\DebugTest.tiff.seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\ReceiveRedo.tif.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\DebugTest.tiff.howto_seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\HideNew.png.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\ReceiveRedo.tif => C:\Users\Admin\Pictures\ReceiveRedo.tif.seccrypt Nsi.exe File renamed C:\Users\Admin\Pictures\StartReset.crw => C:\Users\Admin\Pictures\StartReset.crw.seccrypt Nsi.exe File opened for modification C:\Users\Admin\Pictures\StartReset.crw.seccrypt Nsi.exe File created C:\Users\Admin\Pictures\HideNew.png.howto_seccrypt Nsi.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1748 icacls.exe 1496 takeown.exe -
Deletes itself 1 IoCs
pid Process 664 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 844 82d841869e912a772413bb37f30307b0.exe 844 82d841869e912a772413bb37f30307b0.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1496 takeown.exe 1748 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nsi.exe Nsi:bin File opened for modification C:\Windows\SysWOW64\Nsi.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1996 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Nsi:bin 82d841869e912a772413bb37f30307b0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1732 vssvc.exe Token: SeRestorePrivilege 1732 vssvc.exe Token: SeAuditPrivilege 1732 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 notepad.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 844 wrote to memory of 2036 844 82d841869e912a772413bb37f30307b0.exe 26 PID 844 wrote to memory of 2036 844 82d841869e912a772413bb37f30307b0.exe 26 PID 844 wrote to memory of 2036 844 82d841869e912a772413bb37f30307b0.exe 26 PID 844 wrote to memory of 2036 844 82d841869e912a772413bb37f30307b0.exe 26 PID 2036 wrote to memory of 1996 2036 Nsi:bin 27 PID 2036 wrote to memory of 1996 2036 Nsi:bin 27 PID 2036 wrote to memory of 1996 2036 Nsi:bin 27 PID 2036 wrote to memory of 1996 2036 Nsi:bin 27 PID 2036 wrote to memory of 1496 2036 Nsi:bin 31 PID 2036 wrote to memory of 1496 2036 Nsi:bin 31 PID 2036 wrote to memory of 1496 2036 Nsi:bin 31 PID 2036 wrote to memory of 1496 2036 Nsi:bin 31 PID 2036 wrote to memory of 1748 2036 Nsi:bin 33 PID 2036 wrote to memory of 1748 2036 Nsi:bin 33 PID 2036 wrote to memory of 1748 2036 Nsi:bin 33 PID 2036 wrote to memory of 1748 2036 Nsi:bin 33 PID 1180 wrote to memory of 568 1180 Nsi.exe 37 PID 1180 wrote to memory of 568 1180 Nsi.exe 37 PID 1180 wrote to memory of 568 1180 Nsi.exe 37 PID 1180 wrote to memory of 568 1180 Nsi.exe 37 PID 568 wrote to memory of 1176 568 cmd.exe 39 PID 568 wrote to memory of 1176 568 cmd.exe 39 PID 568 wrote to memory of 1176 568 cmd.exe 39 PID 568 wrote to memory of 1176 568 cmd.exe 39 PID 2036 wrote to memory of 1404 2036 Nsi:bin 43 PID 2036 wrote to memory of 1404 2036 Nsi:bin 43 PID 2036 wrote to memory of 1404 2036 Nsi:bin 43 PID 2036 wrote to memory of 1404 2036 Nsi:bin 43 PID 844 wrote to memory of 664 844 82d841869e912a772413bb37f30307b0.exe 45 PID 844 wrote to memory of 664 844 82d841869e912a772413bb37f30307b0.exe 45 PID 844 wrote to memory of 664 844 82d841869e912a772413bb37f30307b0.exe 45 PID 844 wrote to memory of 664 844 82d841869e912a772413bb37f30307b0.exe 45 PID 1404 wrote to memory of 1716 1404 cmd.exe 47 PID 1404 wrote to memory of 1716 1404 cmd.exe 47 PID 1404 wrote to memory of 1716 1404 cmd.exe 47 PID 1404 wrote to memory of 1716 1404 cmd.exe 47 PID 664 wrote to memory of 1684 664 cmd.exe 48 PID 664 wrote to memory of 1684 664 cmd.exe 48 PID 664 wrote to memory of 1684 664 cmd.exe 48 PID 664 wrote to memory of 1684 664 cmd.exe 48 PID 568 wrote to memory of 1480 568 cmd.exe 50 PID 568 wrote to memory of 1480 568 cmd.exe 50 PID 568 wrote to memory of 1480 568 cmd.exe 50 PID 568 wrote to memory of 1480 568 cmd.exe 50 PID 1404 wrote to memory of 1664 1404 cmd.exe 52 PID 1404 wrote to memory of 1664 1404 cmd.exe 52 PID 1404 wrote to memory of 1664 1404 cmd.exe 52 PID 1404 wrote to memory of 1664 1404 cmd.exe 52 PID 664 wrote to memory of 900 664 cmd.exe 53 PID 664 wrote to memory of 900 664 cmd.exe 53 PID 664 wrote to memory of 900 664 cmd.exe 53 PID 664 wrote to memory of 900 664 cmd.exe 53 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 900 attrib.exe 1480 attrib.exe 1664 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d841869e912a772413bb37f30307b0.exe"C:\Users\Admin\AppData\Local\Temp\82d841869e912a772413bb37f30307b0.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\Nsi:binC:\Users\Admin\AppData\Roaming\Nsi:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1996
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Nsi.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1496
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Nsi.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1748
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Nsi" & del "C:\Users\Admin\AppData\Roaming\Nsi"3⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1716
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Nsi"4⤵
- Views/modifies file attributes
PID:1664
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\82d841869e912a772413bb37f30307b0.exe" & del "C:\Users\Admin\AppData\Local\Temp\82d841869e912a772413bb37f30307b0.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1684
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\82d841869e912a772413bb37f30307b0.exe"3⤵
- Views/modifies file attributes
PID:900
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
C:\Windows\SysWOW64\Nsi.exeC:\Windows\SysWOW64\Nsi.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Nsi.exe" & del "C:\Windows\SysWOW64\Nsi.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1176
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Nsi.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1480
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1348
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:2028