Analysis
-
max time kernel
173s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 20:43
Static task
static1
Behavioral task
behavioral1
Sample
df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe
Resource
win10v2004-20220414-en
General
-
Target
df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe
-
Size
2.3MB
-
MD5
93d20353d7135a1086eac5855edafabf
-
SHA1
7dc81975c33c142aba3f1351c7bc066181a2a8c6
-
SHA256
df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa
-
SHA512
f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 1004 Device:bin 960 Device.exe -
Modifies extensions of user files 15 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CompressCheckpoint.tif.tcwwasted Device.exe File renamed C:\Users\Admin\Pictures\RequestRead.raw => C:\Users\Admin\Pictures\RequestRead.raw.tcwwasted Device.exe File renamed C:\Users\Admin\Pictures\RestoreRequest.png => C:\Users\Admin\Pictures\RestoreRequest.png.tcwwasted Device.exe File renamed C:\Users\Admin\Pictures\CompressCheckpoint.tif => C:\Users\Admin\Pictures\CompressCheckpoint.tif.tcwwasted Device.exe File opened for modification C:\Users\Admin\Pictures\JoinSet.png.tcwwasted Device.exe File created C:\Users\Admin\Pictures\RegisterSend.png.tcwwasted_info Device.exe File created C:\Users\Admin\Pictures\RequestRead.raw.tcwwasted_info Device.exe File opened for modification C:\Users\Admin\Pictures\RequestRead.raw.tcwwasted Device.exe File created C:\Users\Admin\Pictures\CompressCheckpoint.tif.tcwwasted_info Device.exe File renamed C:\Users\Admin\Pictures\RegisterSend.png => C:\Users\Admin\Pictures\RegisterSend.png.tcwwasted Device.exe File opened for modification C:\Users\Admin\Pictures\RegisterSend.png.tcwwasted Device.exe File created C:\Users\Admin\Pictures\JoinSet.png.tcwwasted_info Device.exe File renamed C:\Users\Admin\Pictures\JoinSet.png => C:\Users\Admin\Pictures\JoinSet.png.tcwwasted Device.exe File created C:\Users\Admin\Pictures\RestoreRequest.png.tcwwasted_info Device.exe File opened for modification C:\Users\Admin\Pictures\RestoreRequest.png.tcwwasted Device.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 1064 takeown.exe 1872 icacls.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Device:bin Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Device.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Device.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Device:bin -
Loads dropped DLL 2 IoCs
pid Process 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1064 takeown.exe 1872 icacls.exe -
resource yara_rule behavioral1/memory/1464-56-0x0000000000400000-0x0000000000A09000-memory.dmp themida behavioral1/memory/1464-57-0x00000000774C0000-0x0000000077640000-memory.dmp themida behavioral1/files/0x000a00000001231b-63.dat themida behavioral1/files/0x000a00000001231b-65.dat themida behavioral1/memory/1004-67-0x0000000000400000-0x0000000000A09000-memory.dmp themida behavioral1/files/0x00060000000055d7-72.dat themida behavioral1/files/0x00060000000055d7-74.dat themida behavioral1/memory/960-77-0x0000000000400000-0x0000000000A09000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Device:bin Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Device.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Device.exe Device:bin -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 1004 Device:bin 960 Device.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 316 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Device:bin df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1496 vssvc.exe Token: SeRestorePrivilege 1496 vssvc.exe Token: SeAuditPrivilege 1496 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1004 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 28 PID 1464 wrote to memory of 1004 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 28 PID 1464 wrote to memory of 1004 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 28 PID 1464 wrote to memory of 1004 1464 df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe 28 PID 1004 wrote to memory of 316 1004 Device:bin 29 PID 1004 wrote to memory of 316 1004 Device:bin 29 PID 1004 wrote to memory of 316 1004 Device:bin 29 PID 1004 wrote to memory of 316 1004 Device:bin 29 PID 1004 wrote to memory of 1064 1004 Device:bin 33 PID 1004 wrote to memory of 1064 1004 Device:bin 33 PID 1004 wrote to memory of 1064 1004 Device:bin 33 PID 1004 wrote to memory of 1064 1004 Device:bin 33 PID 1004 wrote to memory of 1872 1004 Device:bin 35 PID 1004 wrote to memory of 1872 1004 Device:bin 35 PID 1004 wrote to memory of 1872 1004 Device:bin 35 PID 1004 wrote to memory of 1872 1004 Device:bin 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe"C:\Users\Admin\AppData\Local\Temp\df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Roaming\Device:binC:\Users\Admin\AppData\Roaming\Device:bin -r2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:316
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Device.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1064
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Device.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1872
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
C:\Windows\SysWOW64\Device.exeC:\Windows\SysWOW64\Device.exe -s1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD593d20353d7135a1086eac5855edafabf
SHA17dc81975c33c142aba3f1351c7bc066181a2a8c6
SHA256df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa
SHA512f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f
-
Filesize
2.3MB
MD593d20353d7135a1086eac5855edafabf
SHA17dc81975c33c142aba3f1351c7bc066181a2a8c6
SHA256df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa
SHA512f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f
-
Filesize
2.3MB
MD593d20353d7135a1086eac5855edafabf
SHA17dc81975c33c142aba3f1351c7bc066181a2a8c6
SHA256df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa
SHA512f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f
-
Filesize
2.3MB
MD593d20353d7135a1086eac5855edafabf
SHA17dc81975c33c142aba3f1351c7bc066181a2a8c6
SHA256df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa
SHA512f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f
-
Filesize
45KB
MD5c9a6121252634aa4d4618981de929bbb
SHA1170b041a5729c4be4281573e1442c6a07e528708
SHA256ff7b6e0a02b6e1182ce7be8813b57d0d472bda307086bd40a237b76aee0f54ca
SHA5127510673c3af69a0df48105f75975583d4a2f97bdfa8c72123b0801af6ea304d6a85dd121630c735b6b83a3077fb16e14f7183c4f7679d996f002b02859db7b69
-
Filesize
45KB
MD5c9a6121252634aa4d4618981de929bbb
SHA1170b041a5729c4be4281573e1442c6a07e528708
SHA256ff7b6e0a02b6e1182ce7be8813b57d0d472bda307086bd40a237b76aee0f54ca
SHA5127510673c3af69a0df48105f75975583d4a2f97bdfa8c72123b0801af6ea304d6a85dd121630c735b6b83a3077fb16e14f7183c4f7679d996f002b02859db7b69