Analysis
-
max time kernel
23s -
max time network
114s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26/07/2021, 12:42
Behavioral task
behavioral1
Sample
ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe
Resource
win10v20210408
General
-
Target
ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe
-
Size
951KB
-
MD5
edbf07eaca4fff5f2d3f045567a9dc6f
-
SHA1
9292fa66c917bfa47e8012d302a69bec48e9b98c
-
SHA256
ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3
-
SHA512
731214358d4fcecdafe0d386a305a130185727b20704e6251e37ac5feb35eff8f3f31d8c740954feb57c699cc5975c3bb50fac5c5202c5933c4fe0dfd06bc8e6
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
resource yara_rule behavioral1/files/0x0004000000013104-66.dat cryptone behavioral1/files/0x0004000000013104-69.dat cryptone behavioral1/files/0x0005000000005668-71.dat cryptone behavioral1/files/0x0005000000005668-73.dat cryptone -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1988 Secure:bin 1640 Secure.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\UndoRead.tiff.d2lwasted Secure.exe File created C:\Users\Admin\Pictures\MeasureUpdate.tiff.d2lwasted_info Secure.exe File renamed C:\Users\Admin\Pictures\MeasureUpdate.tiff => C:\Users\Admin\Pictures\MeasureUpdate.tiff.d2lwasted Secure.exe File opened for modification C:\Users\Admin\Pictures\ExportReceive.tiff.d2lwasted Secure.exe File opened for modification C:\Users\Admin\Pictures\MeasureUpdate.tiff.d2lwasted Secure.exe File created C:\Users\Admin\Pictures\UndoRead.tiff.d2lwasted_info Secure.exe File renamed C:\Users\Admin\Pictures\UndoRead.tiff => C:\Users\Admin\Pictures\UndoRead.tiff.d2lwasted Secure.exe File created C:\Users\Admin\Pictures\ExportReceive.tiff.d2lwasted_info Secure.exe File renamed C:\Users\Admin\Pictures\ExportReceive.tiff => C:\Users\Admin\Pictures\ExportReceive.tiff.d2lwasted Secure.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1300 takeown.exe 1144 icacls.exe -
Deletes itself 1 IoCs
pid Process 516 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1300 takeown.exe 1144 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Secure.exe Secure:bin File opened for modification C:\Windows\SysWOW64\Secure.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1192 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Secure:bin ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1980 vssvc.exe Token: SeRestorePrivilege 1980 vssvc.exe Token: SeAuditPrivilege 1980 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 308 wrote to memory of 1988 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 26 PID 308 wrote to memory of 1988 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 26 PID 308 wrote to memory of 1988 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 26 PID 308 wrote to memory of 1988 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 26 PID 1988 wrote to memory of 1192 1988 Secure:bin 27 PID 1988 wrote to memory of 1192 1988 Secure:bin 27 PID 1988 wrote to memory of 1192 1988 Secure:bin 27 PID 1988 wrote to memory of 1192 1988 Secure:bin 27 PID 1988 wrote to memory of 1300 1988 Secure:bin 31 PID 1988 wrote to memory of 1300 1988 Secure:bin 31 PID 1988 wrote to memory of 1300 1988 Secure:bin 31 PID 1988 wrote to memory of 1300 1988 Secure:bin 31 PID 1988 wrote to memory of 1144 1988 Secure:bin 33 PID 1988 wrote to memory of 1144 1988 Secure:bin 33 PID 1988 wrote to memory of 1144 1988 Secure:bin 33 PID 1988 wrote to memory of 1144 1988 Secure:bin 33 PID 1640 wrote to memory of 1840 1640 Secure.exe 37 PID 1640 wrote to memory of 1840 1640 Secure.exe 37 PID 1640 wrote to memory of 1840 1640 Secure.exe 37 PID 1640 wrote to memory of 1840 1640 Secure.exe 37 PID 1840 wrote to memory of 1124 1840 cmd.exe 39 PID 1840 wrote to memory of 1124 1840 cmd.exe 39 PID 1840 wrote to memory of 1124 1840 cmd.exe 39 PID 1840 wrote to memory of 1124 1840 cmd.exe 39 PID 1988 wrote to memory of 928 1988 Secure:bin 41 PID 1988 wrote to memory of 928 1988 Secure:bin 41 PID 1988 wrote to memory of 928 1988 Secure:bin 41 PID 1988 wrote to memory of 928 1988 Secure:bin 41 PID 308 wrote to memory of 516 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 43 PID 308 wrote to memory of 516 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 43 PID 308 wrote to memory of 516 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 43 PID 308 wrote to memory of 516 308 ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe 43 PID 928 wrote to memory of 672 928 cmd.exe 44 PID 928 wrote to memory of 672 928 cmd.exe 44 PID 928 wrote to memory of 672 928 cmd.exe 44 PID 928 wrote to memory of 672 928 cmd.exe 44 PID 516 wrote to memory of 1552 516 cmd.exe 46 PID 516 wrote to memory of 1552 516 cmd.exe 46 PID 516 wrote to memory of 1552 516 cmd.exe 46 PID 516 wrote to memory of 1552 516 cmd.exe 46 PID 1840 wrote to memory of 1760 1840 cmd.exe 49 PID 1840 wrote to memory of 1760 1840 cmd.exe 49 PID 1840 wrote to memory of 1760 1840 cmd.exe 49 PID 1840 wrote to memory of 1760 1840 cmd.exe 49 PID 928 wrote to memory of 1804 928 cmd.exe 50 PID 928 wrote to memory of 1804 928 cmd.exe 50 PID 928 wrote to memory of 1804 928 cmd.exe 50 PID 928 wrote to memory of 1804 928 cmd.exe 50 PID 516 wrote to memory of 1732 516 cmd.exe 51 PID 516 wrote to memory of 1732 516 cmd.exe 51 PID 516 wrote to memory of 1732 516 cmd.exe 51 PID 516 wrote to memory of 1732 516 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1760 attrib.exe 1804 attrib.exe 1732 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe"C:\Users\Admin\AppData\Local\Temp\ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Roaming\Secure:binC:\Users\Admin\AppData\Roaming\Secure:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1192
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Secure.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1300
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Secure.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1144
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Secure" & del "C:\Users\Admin\AppData\Roaming\Secure"3⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:672
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Secure"4⤵
- Views/modifies file attributes
PID:1804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe" & del "C:\Users\Admin\AppData\Local\Temp\ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1552
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3.sample.exe"3⤵
- Views/modifies file attributes
PID:1732
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
C:\Windows\SysWOW64\Secure.exeC:\Windows\SysWOW64\Secure.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Secure.exe" & del "C:\Windows\SysWOW64\Secure.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1124
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Secure.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1760
-
-