Analysis
-
max time kernel
22s -
max time network
69s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:42
Behavioral task
behavioral1
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe
Resource
win10v20210408
General
-
Target
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe
-
Size
1.0MB
-
MD5
572fea5f025df78f2d316216fbeee52e
-
SHA1
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
-
SHA256
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
-
SHA512
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
resource yara_rule behavioral1/files/0x00040000000130e0-64.dat cryptone behavioral1/files/0x00040000000130e0-69.dat cryptone behavioral1/files/0x0005000000005668-71.dat cryptone behavioral1/files/0x0005000000005668-73.dat cryptone -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1212 Session:bin 1208 Session.exe -
Modifies extensions of user files 21 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\GrantUndo.raw.rlhwasted Session.exe File renamed C:\Users\Admin\Pictures\InvokeSearch.tiff => C:\Users\Admin\Pictures\InvokeSearch.tiff.rlhwasted Session.exe File opened for modification C:\Users\Admin\Pictures\InvokeSearch.tiff.rlhwasted Session.exe File renamed C:\Users\Admin\Pictures\RedoTrace.png => C:\Users\Admin\Pictures\RedoTrace.png.rlhwasted Session.exe File opened for modification C:\Users\Admin\Pictures\RedoTrace.png.rlhwasted Session.exe File renamed C:\Users\Admin\Pictures\BackupAdd.tiff => C:\Users\Admin\Pictures\BackupAdd.tiff.rlhwasted Session.exe File opened for modification C:\Users\Admin\Pictures\BackupAdd.tiff.rlhwasted Session.exe File renamed C:\Users\Admin\Pictures\DebugTrace.png => C:\Users\Admin\Pictures\DebugTrace.png.rlhwasted Session.exe File created C:\Users\Admin\Pictures\InvokeSearch.tiff.rlhwasted_info Session.exe File renamed C:\Users\Admin\Pictures\AssertOptimize.png => C:\Users\Admin\Pictures\AssertOptimize.png.rlhwasted Session.exe File opened for modification C:\Users\Admin\Pictures\AssertOptimize.png.rlhwasted Session.exe File created C:\Users\Admin\Pictures\DebugTrace.png.rlhwasted_info Session.exe File renamed C:\Users\Admin\Pictures\RestartDisable.tif => C:\Users\Admin\Pictures\RestartDisable.tif.rlhwasted Session.exe File created C:\Users\Admin\Pictures\GrantUndo.raw.rlhwasted_info Session.exe File renamed C:\Users\Admin\Pictures\GrantUndo.raw => C:\Users\Admin\Pictures\GrantUndo.raw.rlhwasted Session.exe File created C:\Users\Admin\Pictures\RestartDisable.tif.rlhwasted_info Session.exe File created C:\Users\Admin\Pictures\RedoTrace.png.rlhwasted_info Session.exe File opened for modification C:\Users\Admin\Pictures\RestartDisable.tif.rlhwasted Session.exe File created C:\Users\Admin\Pictures\AssertOptimize.png.rlhwasted_info Session.exe File created C:\Users\Admin\Pictures\BackupAdd.tiff.rlhwasted_info Session.exe File opened for modification C:\Users\Admin\Pictures\DebugTrace.png.rlhwasted Session.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1644 takeown.exe 672 icacls.exe -
Deletes itself 1 IoCs
pid Process 972 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1644 takeown.exe 672 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Session.exe Session:bin File opened for modification C:\Windows\SysWOW64\Session.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1928 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Session:bin 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1788 vssvc.exe Token: SeRestorePrivilege 1788 vssvc.exe Token: SeAuditPrivilege 1788 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1212 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 26 PID 1672 wrote to memory of 1212 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 26 PID 1672 wrote to memory of 1212 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 26 PID 1672 wrote to memory of 1212 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 26 PID 1212 wrote to memory of 1928 1212 Session:bin 27 PID 1212 wrote to memory of 1928 1212 Session:bin 27 PID 1212 wrote to memory of 1928 1212 Session:bin 27 PID 1212 wrote to memory of 1928 1212 Session:bin 27 PID 1212 wrote to memory of 1644 1212 Session:bin 31 PID 1212 wrote to memory of 1644 1212 Session:bin 31 PID 1212 wrote to memory of 1644 1212 Session:bin 31 PID 1212 wrote to memory of 1644 1212 Session:bin 31 PID 1212 wrote to memory of 672 1212 Session:bin 33 PID 1212 wrote to memory of 672 1212 Session:bin 33 PID 1212 wrote to memory of 672 1212 Session:bin 33 PID 1212 wrote to memory of 672 1212 Session:bin 33 PID 1208 wrote to memory of 748 1208 Session.exe 37 PID 1208 wrote to memory of 748 1208 Session.exe 37 PID 1208 wrote to memory of 748 1208 Session.exe 37 PID 1208 wrote to memory of 748 1208 Session.exe 37 PID 1212 wrote to memory of 1816 1212 Session:bin 38 PID 1212 wrote to memory of 1816 1212 Session:bin 38 PID 1212 wrote to memory of 1816 1212 Session:bin 38 PID 1212 wrote to memory of 1816 1212 Session:bin 38 PID 1672 wrote to memory of 972 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 41 PID 1672 wrote to memory of 972 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 41 PID 1672 wrote to memory of 972 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 41 PID 1672 wrote to memory of 972 1672 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe 41 PID 1816 wrote to memory of 1692 1816 cmd.exe 42 PID 1816 wrote to memory of 1692 1816 cmd.exe 42 PID 1816 wrote to memory of 1692 1816 cmd.exe 42 PID 1816 wrote to memory of 1692 1816 cmd.exe 42 PID 748 wrote to memory of 896 748 cmd.exe 44 PID 748 wrote to memory of 896 748 cmd.exe 44 PID 748 wrote to memory of 896 748 cmd.exe 44 PID 748 wrote to memory of 896 748 cmd.exe 44 PID 972 wrote to memory of 928 972 cmd.exe 45 PID 972 wrote to memory of 928 972 cmd.exe 45 PID 972 wrote to memory of 928 972 cmd.exe 45 PID 972 wrote to memory of 928 972 cmd.exe 45 PID 1816 wrote to memory of 1536 1816 cmd.exe 50 PID 1816 wrote to memory of 1536 1816 cmd.exe 50 PID 1816 wrote to memory of 1536 1816 cmd.exe 50 PID 1816 wrote to memory of 1536 1816 cmd.exe 50 PID 748 wrote to memory of 1620 748 cmd.exe 49 PID 748 wrote to memory of 1620 748 cmd.exe 49 PID 748 wrote to memory of 1620 748 cmd.exe 49 PID 748 wrote to memory of 1620 748 cmd.exe 49 PID 972 wrote to memory of 1724 972 cmd.exe 51 PID 972 wrote to memory of 1724 972 cmd.exe 51 PID 972 wrote to memory of 1724 972 cmd.exe 51 PID 972 wrote to memory of 1724 972 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1620 attrib.exe 1536 attrib.exe 1724 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe"C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\Session:binC:\Users\Admin\AppData\Roaming\Session:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1928
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Session.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1644
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Session.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:672
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Session" & del "C:\Users\Admin\AppData\Roaming\Session"3⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1692
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Session"4⤵
- Views/modifies file attributes
PID:1536
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe" & del "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:928
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample.exe"3⤵
- Views/modifies file attributes
PID:1724
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
C:\Windows\SysWOW64\Session.exeC:\Windows\SysWOW64\Session.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Session.exe" & del "C:\Windows\SysWOW64\Session.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:896
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Session.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1620
-
-