Analysis
-
max time kernel
139s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
Resource
win10v2004-20240412-en
General
-
Target
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe
-
Size
60KB
-
MD5
0ed2ca539a01cdb86c88a9a1604b2005
-
SHA1
4fed7eae00bfa21938e49f33b7c6794fd7d0750c
-
SHA256
bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
-
SHA512
34dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2
-
SSDEEP
1536:HO88wNYmqdeBk7G7IhhqZKWVKz8NqUxVl2HihgOrT8avvvvvvvvvvvvvvvvvvvv:HOmhqdeBk+nc9OrTZvvvvvvvvvvvvvvX
Malware Config
Signatures
-
WastedLocker
Ransomware family seen in the wild since May 2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (132) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Possible privilege escalation attempt 2 IoCs
pid Process 3552 takeown.exe 4888 icacls.exe -
Executes dropped EXE 2 IoCs
pid Process 3600 Status:bin 4568 Status.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3552 takeown.exe 4888 icacls.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Status.exe Status:bin File opened for modification C:\Windows\SysWOW64\Status.exe attrib.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1404 vssadmin.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Status:bin bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4668 vssvc.exe Token: SeRestorePrivilege 4668 vssvc.exe Token: SeAuditPrivilege 4668 vssvc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3600 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 87 PID 3988 wrote to memory of 3600 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 87 PID 3988 wrote to memory of 3600 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 87 PID 3600 wrote to memory of 1404 3600 Status:bin 88 PID 3600 wrote to memory of 1404 3600 Status:bin 88 PID 3600 wrote to memory of 3552 3600 Status:bin 94 PID 3600 wrote to memory of 3552 3600 Status:bin 94 PID 3600 wrote to memory of 3552 3600 Status:bin 94 PID 3600 wrote to memory of 4888 3600 Status:bin 96 PID 3600 wrote to memory of 4888 3600 Status:bin 96 PID 3600 wrote to memory of 4888 3600 Status:bin 96 PID 4568 wrote to memory of 3568 4568 Status.exe 99 PID 4568 wrote to memory of 3568 4568 Status.exe 99 PID 4568 wrote to memory of 3568 4568 Status.exe 99 PID 3568 wrote to memory of 3580 3568 cmd.exe 101 PID 3568 wrote to memory of 3580 3568 cmd.exe 101 PID 3568 wrote to memory of 3580 3568 cmd.exe 101 PID 3600 wrote to memory of 1496 3600 Status:bin 102 PID 3600 wrote to memory of 1496 3600 Status:bin 102 PID 3600 wrote to memory of 1496 3600 Status:bin 102 PID 3988 wrote to memory of 3788 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 104 PID 3988 wrote to memory of 3788 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 104 PID 3988 wrote to memory of 3788 3988 bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe 104 PID 1496 wrote to memory of 1308 1496 cmd.exe 106 PID 1496 wrote to memory of 1308 1496 cmd.exe 106 PID 1496 wrote to memory of 1308 1496 cmd.exe 106 PID 3788 wrote to memory of 3776 3788 cmd.exe 107 PID 3788 wrote to memory of 3776 3788 cmd.exe 107 PID 3788 wrote to memory of 3776 3788 cmd.exe 107 PID 3568 wrote to memory of 5044 3568 cmd.exe 112 PID 3568 wrote to memory of 5044 3568 cmd.exe 112 PID 3568 wrote to memory of 5044 3568 cmd.exe 112 PID 3788 wrote to memory of 4776 3788 cmd.exe 113 PID 3788 wrote to memory of 4776 3788 cmd.exe 113 PID 3788 wrote to memory of 4776 3788 cmd.exe 113 PID 1496 wrote to memory of 724 1496 cmd.exe 114 PID 1496 wrote to memory of 724 1496 cmd.exe 114 PID 1496 wrote to memory of 724 1496 cmd.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 5044 attrib.exe 4776 attrib.exe 724 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\Status:binC:\Users\Admin\AppData\Roaming\Status:bin -r2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1404
-
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\system32\takeown.exe /F C:\Windows\system32\Status.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3552
-
-
C:\Windows\SysWOW64\icacls.exeC:\Windows\system32\icacls.exe C:\Windows\system32\Status.exe /reset3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4888
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Roaming\Status" & del "C:\Users\Admin\AppData\Roaming\Status"3⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y4⤵PID:1308
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Status"4⤵
- Views/modifies file attributes
PID:724
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe" & del "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:3776
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8.exe"3⤵
- Views/modifies file attributes
PID:4776
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
C:\Windows\SysWOW64\Status.exeC:\Windows\SysWOW64\Status.exe -s1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd /c choice /t 10 /d y & attrib -h "C:\Windows\SysWOW64\Status.exe" & del "C:\Windows\SysWOW64\Status.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\choice.exechoice /t 10 /d y3⤵PID:3580
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Windows\SysWOW64\Status.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:5044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD50ed2ca539a01cdb86c88a9a1604b2005
SHA14fed7eae00bfa21938e49f33b7c6794fd7d0750c
SHA256bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
SHA51234dad101cd7c5f9ff2267674d224986b9274e0e17d9ae665ca1af4ffa57408106238b1e248045465ab17c72a4b92473ab3714aefb705d95f9725a4251379c7e2