Analysis
-
max time kernel
15s -
max time network
123s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe
Resource
win10v20210410
General
-
Target
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe
-
Size
60KB
-
MD5
0ed2ca539a01cdb86c88a9a1604b2005
-
SHA1
4fed7eae00bfa21938e49f33b7c6794fd7d0750c
-
SHA256
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
-
SHA512
34dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1400 Lsa:bin 1276 Lsa.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SelectUnpublish.crw.bbawasted_info Lsa.exe File renamed C:\Users\Admin\Pictures\SelectUnpublish.crw => C:\Users\Admin\Pictures\SelectUnpublish.crw.bbawasted Lsa.exe File opened for modification C:\Users\Admin\Pictures\SelectUnpublish.crw.bbawasted Lsa.exe File created C:\Users\Admin\Pictures\ExportBlock.raw.bbawasted_info Lsa.exe File renamed C:\Users\Admin\Pictures\ExportBlock.raw => C:\Users\Admin\Pictures\ExportBlock.raw.bbawasted Lsa.exe File opened for modification C:\Users\Admin\Pictures\ExportBlock.raw.bbawasted Lsa.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3440 takeown.exe 972 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3440 takeown.exe 972 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lsa.exe Lsa:bin File opened for modification C:\Windows\SysWOW64\Lsa.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1496 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Lsa:bin bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1996 vssvc.exe Token: SeRestorePrivilege 1996 vssvc.exe Token: SeAuditPrivilege 1996 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3164 wrote to memory of 1400 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 75 PID 3164 wrote to memory of 1400 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 75 PID 3164 wrote to memory of 1400 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 75 PID 1400 wrote to memory of 1496 1400 Lsa:bin 76 PID 1400 wrote to memory of 1496 1400 Lsa:bin 76 PID 1400 wrote to memory of 3440 1400 Lsa:bin 81 PID 1400 wrote to memory of 3440 1400 Lsa:bin 81 PID 1400 wrote to memory of 3440 1400 Lsa:bin 81 PID 1400 wrote to memory of 972 1400 Lsa:bin 83 PID 1400 wrote to memory of 972 1400 Lsa:bin 83 PID 1400 wrote to memory of 972 1400 Lsa:bin 83 PID 1276 wrote to memory of 3888 1276 Lsa.exe 86 PID 1276 wrote to memory of 3888 1276 Lsa.exe 86 PID 1276 wrote to memory of 3888 1276 Lsa.exe 86 PID 3888 wrote to memory of 356 3888 cmd.exe 88 PID 3888 wrote to memory of 356 3888 cmd.exe 88 PID 3888 wrote to memory of 356 3888 cmd.exe 88 PID 1400 wrote to memory of 1052 1400 Lsa:bin 89 PID 1400 wrote to memory of 1052 1400 Lsa:bin 89 PID 1400 wrote to memory of 1052 1400 Lsa:bin 89 PID 3164 wrote to memory of 1660 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 91 PID 3164 wrote to memory of 1660 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 91 PID 3164 wrote to memory of 1660 3164 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe 91 PID 1052 wrote to memory of 276 1052 cmd.exe 94 PID 1052 wrote to memory of 276 1052 cmd.exe 94 PID 1052 wrote to memory of 276 1052 cmd.exe 94 PID 1660 wrote to memory of 1784 1660 cmd.exe 93 PID 1660 wrote to memory of 1784 1660 cmd.exe 93 PID 1660 wrote to memory of 1784 1660 cmd.exe 93 PID 3888 wrote to memory of 1888 3888 cmd.exe 98 PID 3888 wrote to memory of 1888 3888 cmd.exe 98 PID 3888 wrote to memory of 1888 3888 cmd.exe 98 PID 1052 wrote to memory of 1276 1052 cmd.exe 99 PID 1052 wrote to memory of 1276 1052 cmd.exe 99 PID 1052 wrote to memory of 1276 1052 cmd.exe 99 PID 1660 wrote to memory of 1480 1660 cmd.exe 100 PID 1660 wrote to memory of 1480 1660 cmd.exe 100 PID 1660 wrote to memory of 1480 1660 cmd.exe 100 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1888 attrib.exe 1276 attrib.exe 1480 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe"C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Roaming\Lsa:binC:\Users\Admin\AppData\Roaming\Lsa:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1496
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Lsa.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3440
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Lsa.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:972
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Lsa" & del "C:\Users\Admin\AppData\Roaming\Lsa"3⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:276
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Lsa"4⤵
- Views/modifies file attributes
PID:1276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe" & del "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1784
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.sample.exe"3⤵
- Views/modifies file attributes
PID:1480
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Windows\SysWOW64\Lsa.exeC:\Windows\SysWOW64\Lsa.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Lsa.exe" & del "C:\Windows\SysWOW64\Lsa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:356
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Lsa.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1888
-
-