Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26/07/2021, 12:42
Behavioral task
behavioral1
Sample
905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe
Resource
win10v20210408
General
-
Target
905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe
-
Size
1.2MB
-
MD5
2cc4534b0dd0e1c8d5b89644274a10c1
-
SHA1
735ee2c15c0b7172f65d39f0fd33b9186ee69653
-
SHA256
905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a
-
SHA512
a842b2d171aa6efa1b391d5d0f84663e78021b485555e2bf10a5e589d8652057f5abbd88e1a5ec628b714692ec5d63c3172894aa7846d5897e87d99dad67e2b8
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
resource yara_rule behavioral1/files/0x00040000000130df-66.dat cryptone behavioral1/files/0x00040000000130df-70.dat cryptone behavioral1/files/0x0005000000005668-72.dat cryptone behavioral1/files/0x0005000000005668-74.dat cryptone -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1272 Options:bin 752 Options.exe -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\BackupClear.crw.garminwasted Options.exe File created C:\Users\Admin\Pictures\RedoTest.tif.garminwasted_info Options.exe File opened for modification C:\Users\Admin\Pictures\RedoTest.tif.garminwasted Options.exe File created C:\Users\Admin\Pictures\SelectOpen.crw.garminwasted_info Options.exe File renamed C:\Users\Admin\Pictures\SelectOpen.crw => C:\Users\Admin\Pictures\SelectOpen.crw.garminwasted Options.exe File opened for modification C:\Users\Admin\Pictures\SelectOpen.crw.garminwasted Options.exe File created C:\Users\Admin\Pictures\BackupClear.crw.garminwasted_info Options.exe File renamed C:\Users\Admin\Pictures\BackupClear.crw => C:\Users\Admin\Pictures\BackupClear.crw.garminwasted Options.exe File renamed C:\Users\Admin\Pictures\RedoTest.tif => C:\Users\Admin\Pictures\RedoTest.tif.garminwasted Options.exe File created C:\Users\Admin\Pictures\SendMove.tif.garminwasted_info Options.exe File renamed C:\Users\Admin\Pictures\SendMove.tif => C:\Users\Admin\Pictures\SendMove.tif.garminwasted Options.exe File opened for modification C:\Users\Admin\Pictures\SendMove.tif.garminwasted Options.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1660 takeown.exe 1700 icacls.exe -
Deletes itself 1 IoCs
pid Process 1324 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1660 takeown.exe 1700 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Options.exe Options:bin File opened for modification C:\Windows\SysWOW64\Options.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1424 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Options:bin 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1788 vssvc.exe Token: SeRestorePrivilege 1788 vssvc.exe Token: SeAuditPrivilege 1788 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1272 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 26 PID 1044 wrote to memory of 1272 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 26 PID 1044 wrote to memory of 1272 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 26 PID 1044 wrote to memory of 1272 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 26 PID 1272 wrote to memory of 1424 1272 Options:bin 27 PID 1272 wrote to memory of 1424 1272 Options:bin 27 PID 1272 wrote to memory of 1424 1272 Options:bin 27 PID 1272 wrote to memory of 1424 1272 Options:bin 27 PID 1272 wrote to memory of 1660 1272 Options:bin 31 PID 1272 wrote to memory of 1660 1272 Options:bin 31 PID 1272 wrote to memory of 1660 1272 Options:bin 31 PID 1272 wrote to memory of 1660 1272 Options:bin 31 PID 1272 wrote to memory of 1700 1272 Options:bin 33 PID 1272 wrote to memory of 1700 1272 Options:bin 33 PID 1272 wrote to memory of 1700 1272 Options:bin 33 PID 1272 wrote to memory of 1700 1272 Options:bin 33 PID 752 wrote to memory of 1048 752 Options.exe 37 PID 752 wrote to memory of 1048 752 Options.exe 37 PID 752 wrote to memory of 1048 752 Options.exe 37 PID 752 wrote to memory of 1048 752 Options.exe 37 PID 1048 wrote to memory of 932 1048 cmd.exe 39 PID 1048 wrote to memory of 932 1048 cmd.exe 39 PID 1048 wrote to memory of 932 1048 cmd.exe 39 PID 1048 wrote to memory of 932 1048 cmd.exe 39 PID 1272 wrote to memory of 1820 1272 Options:bin 42 PID 1272 wrote to memory of 1820 1272 Options:bin 42 PID 1272 wrote to memory of 1820 1272 Options:bin 42 PID 1272 wrote to memory of 1820 1272 Options:bin 42 PID 1044 wrote to memory of 1324 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 43 PID 1044 wrote to memory of 1324 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 43 PID 1044 wrote to memory of 1324 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 43 PID 1044 wrote to memory of 1324 1044 905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe 43 PID 1820 wrote to memory of 844 1820 cmd.exe 47 PID 1820 wrote to memory of 844 1820 cmd.exe 47 PID 1820 wrote to memory of 844 1820 cmd.exe 47 PID 1820 wrote to memory of 844 1820 cmd.exe 47 PID 1324 wrote to memory of 1712 1324 cmd.exe 48 PID 1324 wrote to memory of 1712 1324 cmd.exe 48 PID 1324 wrote to memory of 1712 1324 cmd.exe 48 PID 1324 wrote to memory of 1712 1324 cmd.exe 48 PID 1048 wrote to memory of 1348 1048 cmd.exe 49 PID 1048 wrote to memory of 1348 1048 cmd.exe 49 PID 1048 wrote to memory of 1348 1048 cmd.exe 49 PID 1048 wrote to memory of 1348 1048 cmd.exe 49 PID 1820 wrote to memory of 1692 1820 cmd.exe 51 PID 1820 wrote to memory of 1692 1820 cmd.exe 51 PID 1820 wrote to memory of 1692 1820 cmd.exe 51 PID 1820 wrote to memory of 1692 1820 cmd.exe 51 PID 1324 wrote to memory of 208 1324 cmd.exe 50 PID 1324 wrote to memory of 208 1324 cmd.exe 50 PID 1324 wrote to memory of 208 1324 cmd.exe 50 PID 1324 wrote to memory of 208 1324 cmd.exe 50 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1348 attrib.exe 208 attrib.exe 1692 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe"C:\Users\Admin\AppData\Local\Temp\905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Options:binC:\Users\Admin\AppData\Roaming\Options:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1424
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Options.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1660
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Options.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1700
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Options" & del "C:\Users\Admin\AppData\Roaming\Options"3⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:844
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Options"4⤵
- Views/modifies file attributes
PID:1692
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe" & del "C:\Users\Admin\AppData\Local\Temp\905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1712
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\905ea119ad8d3e54cd228c458a1b5681abc1f35df782977a23812ec4efa0288a.sample.exe"3⤵
- Views/modifies file attributes
PID:208
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
C:\Windows\SysWOW64\Options.exeC:\Windows\SysWOW64\Options.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Options.exe" & del "C:\Windows\SysWOW64\Options.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:932
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Options.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1348
-
-