Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win10v2004-20240412-en
General
-
Target
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
-
Size
60KB
-
MD5
0ed2ca539a01cdb86c88a9a1604b2005
-
SHA1
4fed7eae00bfa21938e49f33b7c6794fd7d0750c
-
SHA256
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
-
SHA512
34dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
-
SSDEEP
1536:HO88wNYmqdeBk7G7IhhqZKWVKz8NqUxVl2HihgOrT8avvvvvvvvvvvvvvvvvvvv:HOmhqdeBk+nc9OrTZvvvvvvvvvvvvvvX
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (213) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Possible privilege escalation attempt 2 IoCs
pid Process 2460 takeown.exe 2492 icacls.exe -
Deletes itself 1 IoCs
pid Process 2388 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 904 Layouts:bin 2536 Layouts.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2492 icacls.exe 2460 takeown.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Layouts.exe Layouts:bin File opened for modification C:\Windows\SysWOW64\Layouts.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2748 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Layouts:bin bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2656 vssvc.exe Token: SeRestorePrivilege 2656 vssvc.exe Token: SeAuditPrivilege 2656 vssvc.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2120 wrote to memory of 904 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 28 PID 2120 wrote to memory of 904 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 28 PID 2120 wrote to memory of 904 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 28 PID 2120 wrote to memory of 904 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 28 PID 904 wrote to memory of 2748 904 Layouts:bin 29 PID 904 wrote to memory of 2748 904 Layouts:bin 29 PID 904 wrote to memory of 2748 904 Layouts:bin 29 PID 904 wrote to memory of 2748 904 Layouts:bin 29 PID 904 wrote to memory of 2460 904 Layouts:bin 33 PID 904 wrote to memory of 2460 904 Layouts:bin 33 PID 904 wrote to memory of 2460 904 Layouts:bin 33 PID 904 wrote to memory of 2460 904 Layouts:bin 33 PID 904 wrote to memory of 2492 904 Layouts:bin 35 PID 904 wrote to memory of 2492 904 Layouts:bin 35 PID 904 wrote to memory of 2492 904 Layouts:bin 35 PID 904 wrote to memory of 2492 904 Layouts:bin 35 PID 2536 wrote to memory of 1632 2536 Layouts.exe 39 PID 2536 wrote to memory of 1632 2536 Layouts.exe 39 PID 2536 wrote to memory of 1632 2536 Layouts.exe 39 PID 2536 wrote to memory of 1632 2536 Layouts.exe 39 PID 1632 wrote to memory of 956 1632 cmd.exe 41 PID 1632 wrote to memory of 956 1632 cmd.exe 41 PID 1632 wrote to memory of 956 1632 cmd.exe 41 PID 1632 wrote to memory of 956 1632 cmd.exe 41 PID 904 wrote to memory of 708 904 Layouts:bin 42 PID 904 wrote to memory of 708 904 Layouts:bin 42 PID 904 wrote to memory of 708 904 Layouts:bin 42 PID 904 wrote to memory of 708 904 Layouts:bin 42 PID 2120 wrote to memory of 2388 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 44 PID 2120 wrote to memory of 2388 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 44 PID 2120 wrote to memory of 2388 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 44 PID 2120 wrote to memory of 2388 2120 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 44 PID 708 wrote to memory of 1996 708 cmd.exe 46 PID 708 wrote to memory of 1996 708 cmd.exe 46 PID 708 wrote to memory of 1996 708 cmd.exe 46 PID 708 wrote to memory of 1996 708 cmd.exe 46 PID 2388 wrote to memory of 1964 2388 cmd.exe 47 PID 2388 wrote to memory of 1964 2388 cmd.exe 47 PID 2388 wrote to memory of 1964 2388 cmd.exe 47 PID 2388 wrote to memory of 1964 2388 cmd.exe 47 PID 1632 wrote to memory of 1196 1632 cmd.exe 48 PID 1632 wrote to memory of 1196 1632 cmd.exe 48 PID 1632 wrote to memory of 1196 1632 cmd.exe 48 PID 1632 wrote to memory of 1196 1632 cmd.exe 48 PID 708 wrote to memory of 1224 708 cmd.exe 49 PID 708 wrote to memory of 1224 708 cmd.exe 49 PID 708 wrote to memory of 1224 708 cmd.exe 49 PID 708 wrote to memory of 1224 708 cmd.exe 49 PID 2388 wrote to memory of 2176 2388 cmd.exe 50 PID 2388 wrote to memory of 2176 2388 cmd.exe 50 PID 2388 wrote to memory of 2176 2388 cmd.exe 50 PID 2388 wrote to memory of 2176 2388 cmd.exe 50 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1196 attrib.exe 1224 attrib.exe 2176 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\Layouts:binC:\Users\Admin\AppData\Roaming\Layouts:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2748
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Layouts.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2460
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Layouts.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Layouts" & del "C:\Users\Admin\AppData\Roaming\Layouts"3⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1996
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Layouts"4⤵
- Views/modifies file attributes
PID:1224
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe" & del "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:1964
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"3⤵
- Views/modifies file attributes
PID:2176
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
C:\Windows\SysWOW64\Layouts.exeC:\Windows\SysWOW64\Layouts.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Layouts.exe" & del "C:\Windows\SysWOW64\Layouts.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:956
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Layouts.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1196
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD50ed2ca539a01cdb86c88a9a1604b2005
SHA14fed7eae00bfa21938e49f33b7c6794fd7d0750c
SHA256bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
SHA51234dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
-
Filesize
9KB
MD582bff322826256f89433e520ffe62cb0
SHA12fed1308a850485c79905a2ee533970f614b14d4
SHA2568a0ae4a665499e769e30b03fd31c423d3c6bb9b53c2b4426524e72dc7e7ccd4a
SHA512c0f10327ede535eee90a5a5952692433eb405b4162ea74329d577c711910b72694ed1b75205ac428a9e5c4701429590e85960bb14e9d01566c0e5af39a0a466b