Analysis
-
max time kernel
32s -
max time network
63s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-07-2021 12:42
Static task
static1
Behavioral task
behavioral1
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe
Resource
win10v20210410
General
-
Target
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe
-
Size
56KB
-
MD5
ecb00e9a61f99a7d4c90723294986bbc
-
SHA1
be59c867da75e2a66b8c2519e950254f817cd4ad
-
SHA256
8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80
-
SHA512
9dee79827d865de41a63962b419eed7e1f9610ff27f00f8b7b2b9f51e905d5db907d310da590d8f1a11ac88e549373edf39bffdb44d1b205728f1b5e0a43aa5e
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1964 Order:bin 1544 Order.exe -
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CopyUnregister.tif.eswasted_info Order.exe File opened for modification C:\Users\Admin\Pictures\PublishOut.png.eswasted Order.exe File created C:\Users\Admin\Pictures\StartConnect.crw.eswasted_info Order.exe File renamed C:\Users\Admin\Pictures\StartConnect.crw => C:\Users\Admin\Pictures\StartConnect.crw.eswasted Order.exe File opened for modification C:\Users\Admin\Pictures\UnprotectOpen.crw.eswasted Order.exe File created C:\Users\Admin\Pictures\MoveHide.raw.eswasted_info Order.exe File renamed C:\Users\Admin\Pictures\MoveHide.raw => C:\Users\Admin\Pictures\MoveHide.raw.eswasted Order.exe File created C:\Users\Admin\Pictures\OutJoin.png.eswasted_info Order.exe File created C:\Users\Admin\Pictures\PublishOut.png.eswasted_info Order.exe File opened for modification C:\Users\Admin\Pictures\StartConnect.crw.eswasted Order.exe File created C:\Users\Admin\Pictures\UnprotectOpen.crw.eswasted_info Order.exe File renamed C:\Users\Admin\Pictures\CopyUnregister.tif => C:\Users\Admin\Pictures\CopyUnregister.tif.eswasted Order.exe File opened for modification C:\Users\Admin\Pictures\MoveHide.raw.eswasted Order.exe File opened for modification C:\Users\Admin\Pictures\OutJoin.png.eswasted Order.exe File renamed C:\Users\Admin\Pictures\UnprotectOpen.crw => C:\Users\Admin\Pictures\UnprotectOpen.crw.eswasted Order.exe File opened for modification C:\Users\Admin\Pictures\CopyUnregister.tif.eswasted Order.exe File renamed C:\Users\Admin\Pictures\OutJoin.png => C:\Users\Admin\Pictures\OutJoin.png.eswasted Order.exe File renamed C:\Users\Admin\Pictures\PublishOut.png => C:\Users\Admin\Pictures\PublishOut.png.eswasted Order.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1136 takeown.exe 968 icacls.exe -
Deletes itself 1 IoCs
pid Process 960 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 968 icacls.exe 1136 takeown.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Order.exe Order:bin File opened for modification C:\Windows\SysWOW64\Order.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1624 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Order:bin 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1620 vssvc.exe Token: SeRestorePrivilege 1620 vssvc.exe Token: SeAuditPrivilege 1620 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1964 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 26 PID 1724 wrote to memory of 1964 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 26 PID 1724 wrote to memory of 1964 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 26 PID 1724 wrote to memory of 1964 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 26 PID 1964 wrote to memory of 1624 1964 Order:bin 27 PID 1964 wrote to memory of 1624 1964 Order:bin 27 PID 1964 wrote to memory of 1624 1964 Order:bin 27 PID 1964 wrote to memory of 1624 1964 Order:bin 27 PID 1964 wrote to memory of 1136 1964 Order:bin 34 PID 1964 wrote to memory of 1136 1964 Order:bin 34 PID 1964 wrote to memory of 1136 1964 Order:bin 34 PID 1964 wrote to memory of 1136 1964 Order:bin 34 PID 1964 wrote to memory of 968 1964 Order:bin 36 PID 1964 wrote to memory of 968 1964 Order:bin 36 PID 1964 wrote to memory of 968 1964 Order:bin 36 PID 1964 wrote to memory of 968 1964 Order:bin 36 PID 1544 wrote to memory of 900 1544 Order.exe 40 PID 1544 wrote to memory of 900 1544 Order.exe 40 PID 1544 wrote to memory of 900 1544 Order.exe 40 PID 1544 wrote to memory of 900 1544 Order.exe 40 PID 900 wrote to memory of 1736 900 cmd.exe 42 PID 900 wrote to memory of 1736 900 cmd.exe 42 PID 900 wrote to memory of 1736 900 cmd.exe 42 PID 900 wrote to memory of 1736 900 cmd.exe 42 PID 1964 wrote to memory of 1640 1964 Order:bin 43 PID 1964 wrote to memory of 1640 1964 Order:bin 43 PID 1964 wrote to memory of 1640 1964 Order:bin 43 PID 1964 wrote to memory of 1640 1964 Order:bin 43 PID 1724 wrote to memory of 960 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 45 PID 1724 wrote to memory of 960 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 45 PID 1724 wrote to memory of 960 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 45 PID 1724 wrote to memory of 960 1724 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe 45 PID 1640 wrote to memory of 1908 1640 cmd.exe 47 PID 1640 wrote to memory of 1908 1640 cmd.exe 47 PID 1640 wrote to memory of 1908 1640 cmd.exe 47 PID 1640 wrote to memory of 1908 1640 cmd.exe 47 PID 960 wrote to memory of 1500 960 cmd.exe 48 PID 960 wrote to memory of 1500 960 cmd.exe 48 PID 960 wrote to memory of 1500 960 cmd.exe 48 PID 960 wrote to memory of 1500 960 cmd.exe 48 PID 900 wrote to memory of 1048 900 cmd.exe 49 PID 900 wrote to memory of 1048 900 cmd.exe 49 PID 900 wrote to memory of 1048 900 cmd.exe 49 PID 900 wrote to memory of 1048 900 cmd.exe 49 PID 1640 wrote to memory of 1688 1640 cmd.exe 50 PID 1640 wrote to memory of 1688 1640 cmd.exe 50 PID 1640 wrote to memory of 1688 1640 cmd.exe 50 PID 1640 wrote to memory of 1688 1640 cmd.exe 50 PID 960 wrote to memory of 1708 960 cmd.exe 51 PID 960 wrote to memory of 1708 960 cmd.exe 51 PID 960 wrote to memory of 1708 960 cmd.exe 51 PID 960 wrote to memory of 1708 960 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1708 attrib.exe 1048 attrib.exe 1688 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe"C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Order:binC:\Users\Admin\AppData\Roaming\Order:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1624
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Order.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1136
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Order.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Order" & del "C:\Users\Admin\AppData\Roaming\Order"3⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1908
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Order"4⤵
- Views/modifies file attributes
PID:1688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe" & del "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1500
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.sample.exe"3⤵
- Views/modifies file attributes
PID:1708
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
C:\Windows\SysWOW64\Order.exeC:\Windows\SysWOW64\Order.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Order.exe" & del "C:\Windows\SysWOW64\Order.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1736
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Order.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1048
-
-