Analysis
-
max time kernel
358s -
max time network
361s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-02-2022 19:19
Static task
static1
Behavioral task
behavioral1
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win10v2004-en-20220112
General
-
Target
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
-
Size
60KB
-
MD5
0ed2ca539a01cdb86c88a9a1604b2005
-
SHA1
4fed7eae00bfa21938e49f33b7c6794fd7d0750c
-
SHA256
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
-
SHA512
34dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1876 Properties:bin 1880 Properties.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\RevokeEnter.tif.bbawasted Properties.exe File created C:\Users\Admin\Pictures\InvokeUnblock.tif.bbawasted_info Properties.exe File renamed C:\Users\Admin\Pictures\InvokeUnblock.tif => C:\Users\Admin\Pictures\InvokeUnblock.tif.bbawasted Properties.exe File opened for modification C:\Users\Admin\Pictures\InvokeUnblock.tif.bbawasted Properties.exe File created C:\Users\Admin\Pictures\RevokeEnter.tif.bbawasted_info Properties.exe File renamed C:\Users\Admin\Pictures\RevokeEnter.tif => C:\Users\Admin\Pictures\RevokeEnter.tif.bbawasted Properties.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1040 takeown.exe 276 icacls.exe -
Deletes itself 1 IoCs
pid Process 1760 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 276 icacls.exe 1040 takeown.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Properties.exe Properties:bin File opened for modification C:\Windows\SysWOW64\Properties.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 652 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Properties:bin bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 556 vssvc.exe Token: SeRestorePrivilege 556 vssvc.exe Token: SeAuditPrivilege 556 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 528 wrote to memory of 1876 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 27 PID 528 wrote to memory of 1876 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 27 PID 528 wrote to memory of 1876 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 27 PID 528 wrote to memory of 1876 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 27 PID 1876 wrote to memory of 652 1876 Properties:bin 28 PID 1876 wrote to memory of 652 1876 Properties:bin 28 PID 1876 wrote to memory of 652 1876 Properties:bin 28 PID 1876 wrote to memory of 652 1876 Properties:bin 28 PID 1876 wrote to memory of 1040 1876 Properties:bin 32 PID 1876 wrote to memory of 1040 1876 Properties:bin 32 PID 1876 wrote to memory of 1040 1876 Properties:bin 32 PID 1876 wrote to memory of 1040 1876 Properties:bin 32 PID 1876 wrote to memory of 276 1876 Properties:bin 34 PID 1876 wrote to memory of 276 1876 Properties:bin 34 PID 1876 wrote to memory of 276 1876 Properties:bin 34 PID 1876 wrote to memory of 276 1876 Properties:bin 34 PID 1880 wrote to memory of 1720 1880 Properties.exe 38 PID 1880 wrote to memory of 1720 1880 Properties.exe 38 PID 1880 wrote to memory of 1720 1880 Properties.exe 38 PID 1880 wrote to memory of 1720 1880 Properties.exe 38 PID 1720 wrote to memory of 1056 1720 cmd.exe 40 PID 1720 wrote to memory of 1056 1720 cmd.exe 40 PID 1720 wrote to memory of 1056 1720 cmd.exe 40 PID 1720 wrote to memory of 1056 1720 cmd.exe 40 PID 1876 wrote to memory of 1900 1876 Properties:bin 41 PID 1876 wrote to memory of 1900 1876 Properties:bin 41 PID 1876 wrote to memory of 1900 1876 Properties:bin 41 PID 1876 wrote to memory of 1900 1876 Properties:bin 41 PID 528 wrote to memory of 1760 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 42 PID 528 wrote to memory of 1760 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 42 PID 528 wrote to memory of 1760 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 42 PID 528 wrote to memory of 1760 528 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 42 PID 1900 wrote to memory of 860 1900 cmd.exe 45 PID 1900 wrote to memory of 860 1900 cmd.exe 45 PID 1900 wrote to memory of 860 1900 cmd.exe 45 PID 1900 wrote to memory of 860 1900 cmd.exe 45 PID 1760 wrote to memory of 1996 1760 cmd.exe 46 PID 1760 wrote to memory of 1996 1760 cmd.exe 46 PID 1760 wrote to memory of 1996 1760 cmd.exe 46 PID 1760 wrote to memory of 1996 1760 cmd.exe 46 PID 1720 wrote to memory of 1912 1720 cmd.exe 47 PID 1720 wrote to memory of 1912 1720 cmd.exe 47 PID 1720 wrote to memory of 1912 1720 cmd.exe 47 PID 1720 wrote to memory of 1912 1720 cmd.exe 47 PID 1760 wrote to memory of 2032 1760 cmd.exe 48 PID 1760 wrote to memory of 2032 1760 cmd.exe 48 PID 1760 wrote to memory of 2032 1760 cmd.exe 48 PID 1760 wrote to memory of 2032 1760 cmd.exe 48 PID 1900 wrote to memory of 544 1900 cmd.exe 49 PID 1900 wrote to memory of 544 1900 cmd.exe 49 PID 1900 wrote to memory of 544 1900 cmd.exe 49 PID 1900 wrote to memory of 544 1900 cmd.exe 49 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1912 attrib.exe 2032 attrib.exe 544 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Roaming\Properties:binC:\Users\Admin\AppData\Roaming\Properties:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:652
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Properties.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1040
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Properties.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:276
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Properties" & del "C:\Users\Admin\AppData\Roaming\Properties"3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:860
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Properties"4⤵
- Views/modifies file attributes
PID:544
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe" & del "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1996
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"3⤵
- Views/modifies file attributes
PID:2032
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:556
-
C:\Windows\SysWOW64\Properties.exeC:\Windows\SysWOW64\Properties.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Properties.exe" & del "C:\Windows\SysWOW64\Properties.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1056
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Properties.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1912
-
-