Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
04/05/2021, 23:44
Behavioral task
behavioral1
Sample
ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe
Resource
win10v20210410
General
-
Target
ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe
-
Size
113KB
-
MD5
0332ce73221dc1b6d26b5f5fa0f06318
-
SHA1
872e61c0a08c9dea4388d5c897b3d7ed3e8c13b7
-
SHA256
ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518
-
SHA512
71482a7798e70ab8176d88e3bfaec0c823118aa19c21b7afdb69f5fd031a91fef4e3d04a05c0ac0752df5904be32e6a9895448f62ee23b015f5e563c29385702
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
resource yara_rule behavioral1/files/0x00040000000130df-66.dat cryptone behavioral1/files/0x00040000000130df-71.dat cryptone behavioral1/files/0x0005000000005668-73.dat cryptone behavioral1/files/0x0005000000005668-75.dat cryptone -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1796 File:bin 2016 File.exe -
Modifies extensions of user files 24 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\BackupTrace.tif.saverswasted_info File.exe File opened for modification C:\Users\Admin\Pictures\BackupTrace.tif.saverswasted File.exe File created C:\Users\Admin\Pictures\MergeApprove.tiff.saverswasted_info File.exe File created C:\Users\Admin\Pictures\UnprotectBackup.crw.saverswasted_info File.exe File opened for modification C:\Users\Admin\Pictures\UnprotectBackup.crw.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\RevokeEdit.crw.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\WatchPing.tiff.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\AddGroup.png.saverswasted File.exe File renamed C:\Users\Admin\Pictures\BackupTrace.tif => C:\Users\Admin\Pictures\BackupTrace.tif.saverswasted File.exe File renamed C:\Users\Admin\Pictures\ConfirmSet.tif => C:\Users\Admin\Pictures\ConfirmSet.tif.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\ConfirmSet.tif.saverswasted File.exe File renamed C:\Users\Admin\Pictures\MergeApprove.tiff => C:\Users\Admin\Pictures\MergeApprove.tiff.saverswasted File.exe File renamed C:\Users\Admin\Pictures\PopShow.crw => C:\Users\Admin\Pictures\PopShow.crw.saverswasted File.exe File created C:\Users\Admin\Pictures\RevokeEdit.crw.saverswasted_info File.exe File created C:\Users\Admin\Pictures\ConfirmSet.tif.saverswasted_info File.exe File created C:\Users\Admin\Pictures\PopShow.crw.saverswasted_info File.exe File renamed C:\Users\Admin\Pictures\UnprotectBackup.crw => C:\Users\Admin\Pictures\UnprotectBackup.crw.saverswasted File.exe File created C:\Users\Admin\Pictures\WatchPing.tiff.saverswasted_info File.exe File created C:\Users\Admin\Pictures\AddGroup.png.saverswasted_info File.exe File renamed C:\Users\Admin\Pictures\AddGroup.png => C:\Users\Admin\Pictures\AddGroup.png.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\MergeApprove.tiff.saverswasted File.exe File opened for modification C:\Users\Admin\Pictures\PopShow.crw.saverswasted File.exe File renamed C:\Users\Admin\Pictures\RevokeEdit.crw => C:\Users\Admin\Pictures\RevokeEdit.crw.saverswasted File.exe File renamed C:\Users\Admin\Pictures\WatchPing.tiff => C:\Users\Admin\Pictures\WatchPing.tiff.saverswasted File.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 428 takeown.exe 916 icacls.exe -
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 428 takeown.exe 916 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\File.exe File:bin File opened for modification C:\Windows\SysWOW64\File.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1168 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\File:bin ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1628 vssvc.exe Token: SeRestorePrivilege 1628 vssvc.exe Token: SeAuditPrivilege 1628 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 notepad.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 792 wrote to memory of 1796 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 25 PID 792 wrote to memory of 1796 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 25 PID 792 wrote to memory of 1796 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 25 PID 792 wrote to memory of 1796 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 25 PID 1796 wrote to memory of 1168 1796 File:bin 26 PID 1796 wrote to memory of 1168 1796 File:bin 26 PID 1796 wrote to memory of 1168 1796 File:bin 26 PID 1796 wrote to memory of 1168 1796 File:bin 26 PID 1796 wrote to memory of 428 1796 File:bin 34 PID 1796 wrote to memory of 428 1796 File:bin 34 PID 1796 wrote to memory of 428 1796 File:bin 34 PID 1796 wrote to memory of 428 1796 File:bin 34 PID 1796 wrote to memory of 916 1796 File:bin 36 PID 1796 wrote to memory of 916 1796 File:bin 36 PID 1796 wrote to memory of 916 1796 File:bin 36 PID 1796 wrote to memory of 916 1796 File:bin 36 PID 2016 wrote to memory of 1608 2016 File.exe 40 PID 2016 wrote to memory of 1608 2016 File.exe 40 PID 2016 wrote to memory of 1608 2016 File.exe 40 PID 2016 wrote to memory of 1608 2016 File.exe 40 PID 1796 wrote to memory of 1680 1796 File:bin 42 PID 1796 wrote to memory of 1680 1796 File:bin 42 PID 1796 wrote to memory of 1680 1796 File:bin 42 PID 1796 wrote to memory of 1680 1796 File:bin 42 PID 1608 wrote to memory of 1640 1608 cmd.exe 43 PID 1608 wrote to memory of 1640 1608 cmd.exe 43 PID 1608 wrote to memory of 1640 1608 cmd.exe 43 PID 1608 wrote to memory of 1640 1608 cmd.exe 43 PID 792 wrote to memory of 1468 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 45 PID 792 wrote to memory of 1468 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 45 PID 792 wrote to memory of 1468 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 45 PID 792 wrote to memory of 1468 792 ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe 45 PID 1680 wrote to memory of 1328 1680 cmd.exe 47 PID 1680 wrote to memory of 1328 1680 cmd.exe 47 PID 1680 wrote to memory of 1328 1680 cmd.exe 47 PID 1680 wrote to memory of 1328 1680 cmd.exe 47 PID 1468 wrote to memory of 2044 1468 cmd.exe 48 PID 1468 wrote to memory of 2044 1468 cmd.exe 48 PID 1468 wrote to memory of 2044 1468 cmd.exe 48 PID 1468 wrote to memory of 2044 1468 cmd.exe 48 PID 1608 wrote to memory of 208 1608 cmd.exe 50 PID 1608 wrote to memory of 208 1608 cmd.exe 50 PID 1608 wrote to memory of 208 1608 cmd.exe 50 PID 1608 wrote to memory of 208 1608 cmd.exe 50 PID 1680 wrote to memory of 228 1680 cmd.exe 52 PID 1680 wrote to memory of 228 1680 cmd.exe 52 PID 1680 wrote to memory of 228 1680 cmd.exe 52 PID 1680 wrote to memory of 228 1680 cmd.exe 52 PID 1468 wrote to memory of 220 1468 cmd.exe 51 PID 1468 wrote to memory of 220 1468 cmd.exe 51 PID 1468 wrote to memory of 220 1468 cmd.exe 51 PID 1468 wrote to memory of 220 1468 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 220 attrib.exe 228 attrib.exe 208 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe"C:\Users\Admin\AppData\Local\Temp\ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Roaming\File:binC:\Users\Admin\AppData\Roaming\File:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1168
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\File.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:428
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\File.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:916
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\File" & del "C:\Users\Admin\AppData\Roaming\File"3⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1328
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\File"4⤵
- Views/modifies file attributes
PID:228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe" & del "C:\Users\Admin\AppData\Local\Temp\ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:2044
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\ef6b588a8b3d3ca409eb2ac15b38bfedcaf9f6bcede91e38b15ae6ba2ef9e518.exe"3⤵
- Views/modifies file attributes
PID:220
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
C:\Windows\SysWOW64\File.exeC:\Windows\SysWOW64\File.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\File.exe" & del "C:\Windows\SysWOW64\File.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1640
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\File.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:208
-
-
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:948