Analysis

  • max time kernel
    173s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 20:43

General

  • Target

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe

  • Size

    2.3MB

  • MD5

    93d20353d7135a1086eac5855edafabf

  • SHA1

    7dc81975c33c142aba3f1351c7bc066181a2a8c6

  • SHA256

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa

  • SHA512

    f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f

Malware Config

Signatures

  • WastedLocker

    Ransomware family seen in the wild since May 2020.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Modifies extensions of user files 15 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Possible privilege escalation attempt 2 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe
    "C:\Users\Admin\AppData\Local\Temp\df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Roaming\Device:bin
      C:\Users\Admin\AppData\Roaming\Device:bin -r
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Windows\system32\vssadmin.exe
        C:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet
        3⤵
        • Interacts with shadow copies
        PID:316
      • C:\Windows\SysWOW64\takeown.exe
        C:\Windows\system32\takeown.exe /F C:\Windows\system32\Device.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1064
      • C:\Windows\SysWOW64\icacls.exe
        C:\Windows\system32\icacls.exe C:\Windows\system32\Device.exe /reset
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1872
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1496
  • C:\Windows\SysWOW64\Device.exe
    C:\Windows\SysWOW64\Device.exe -s
    1⤵
    • Executes dropped EXE
    • Modifies extensions of user files
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:960

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Virtualization/Sandbox Evasion

1
T1497

File Permissions Modification

1
T1222

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Device:bin
    Filesize

    2.3MB

    MD5

    93d20353d7135a1086eac5855edafabf

    SHA1

    7dc81975c33c142aba3f1351c7bc066181a2a8c6

    SHA256

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa

    SHA512

    f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f

  • C:\Users\Admin\AppData\Roaming\Device:bin
    Filesize

    2.3MB

    MD5

    93d20353d7135a1086eac5855edafabf

    SHA1

    7dc81975c33c142aba3f1351c7bc066181a2a8c6

    SHA256

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa

    SHA512

    f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f

  • C:\Windows\SysWOW64\Device.exe
    Filesize

    2.3MB

    MD5

    93d20353d7135a1086eac5855edafabf

    SHA1

    7dc81975c33c142aba3f1351c7bc066181a2a8c6

    SHA256

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa

    SHA512

    f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f

  • C:\Windows\SysWOW64\Device.exe
    Filesize

    2.3MB

    MD5

    93d20353d7135a1086eac5855edafabf

    SHA1

    7dc81975c33c142aba3f1351c7bc066181a2a8c6

    SHA256

    df35c3aa4105063cb41f093ba12a22d3cb1258f6c2fedd9c8a68f033170ae9fa

    SHA512

    f2e8d4132b7d8fb5bce50468ef787e8708570373202c3a0cb626b192e0e0f7262718a9691453cacc49351a5e166677e3681dd387ef72c9dcb72e09257473726f

  • \Users\Admin\AppData\Roaming\Device
    Filesize

    45KB

    MD5

    c9a6121252634aa4d4618981de929bbb

    SHA1

    170b041a5729c4be4281573e1442c6a07e528708

    SHA256

    ff7b6e0a02b6e1182ce7be8813b57d0d472bda307086bd40a237b76aee0f54ca

    SHA512

    7510673c3af69a0df48105f75975583d4a2f97bdfa8c72123b0801af6ea304d6a85dd121630c735b6b83a3077fb16e14f7183c4f7679d996f002b02859db7b69

  • \Users\Admin\AppData\Roaming\Device
    Filesize

    45KB

    MD5

    c9a6121252634aa4d4618981de929bbb

    SHA1

    170b041a5729c4be4281573e1442c6a07e528708

    SHA256

    ff7b6e0a02b6e1182ce7be8813b57d0d472bda307086bd40a237b76aee0f54ca

    SHA512

    7510673c3af69a0df48105f75975583d4a2f97bdfa8c72123b0801af6ea304d6a85dd121630c735b6b83a3077fb16e14f7183c4f7679d996f002b02859db7b69

  • memory/316-68-0x0000000000000000-mapping.dmp
  • memory/960-77-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/960-78-0x00000000774C0000-0x0000000077640000-memory.dmp
    Filesize

    1.5MB

  • memory/960-79-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/1004-70-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/1004-62-0x0000000000000000-mapping.dmp
  • memory/1004-67-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/1004-69-0x00000000774C0000-0x0000000077640000-memory.dmp
    Filesize

    1.5MB

  • memory/1064-71-0x0000000000000000-mapping.dmp
  • memory/1464-54-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
    Filesize

    8KB

  • memory/1464-59-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/1464-58-0x0000000000300000-0x0000000000312000-memory.dmp
    Filesize

    72KB

  • memory/1464-57-0x00000000774C0000-0x0000000077640000-memory.dmp
    Filesize

    1.5MB

  • memory/1464-56-0x0000000000400000-0x0000000000A09000-memory.dmp
    Filesize

    6.0MB

  • memory/1464-55-0x0000000000401000-0x0000000000403000-memory.dmp
    Filesize

    8KB

  • memory/1872-73-0x0000000000000000-mapping.dmp