General

  • Target

    lock.exe

  • Size

    112KB

  • Sample

    200801-ynqmk34srj

  • MD5

    d01fc079881dc0d33a88e4f8df1ae7ce

  • SHA1

    c40c8848808da12ef78c68de1e6477b862161a43

  • SHA256

    0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821

  • SHA512

    83bca79d1f0ac14c6d79685fd192964e7117e8c9c734036abddfdbb068c801ff38027a0812a2499e1d9e528a47af07150cafee27384b5a78b8fc32c23bd21130

Malware Config

Targets

    • Target

      lock.exe

    • Size

      112KB

    • MD5

      d01fc079881dc0d33a88e4f8df1ae7ce

    • SHA1

      c40c8848808da12ef78c68de1e6477b862161a43

    • SHA256

      0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821

    • SHA512

      83bca79d1f0ac14c6d79685fd192964e7117e8c9c734036abddfdbb068c801ff38027a0812a2499e1d9e528a47af07150cafee27384b5a78b8fc32c23bd21130

    • WastedLocker

      Ransomware family seen in the wild since May 2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks