Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. WastedLocker

WastedLocker

WastedLocker is a ransomware family attributed toIndrik Spider that has been used since at least May 2020.WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.[1][2][3]

ID: S0612
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 20 May 2021
Last Modified: 25 March 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.[2]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

WastedLocker has usedcmd to execute commands on the system.[2]

EnterpriseT1543.003Create or Modify System Process:Windows Service

WastedLocker created and established a service that runs until the encryption process is complete.[2]

EnterpriseT1486Data Encrypted for Impact

WastedLocker can encrypt data and leave a ransom note.[1][2][3]

EnterpriseT1140Deobfuscate/Decode Files or Information

WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.[2]

EnterpriseT1083File and Directory Discovery

WastedLocker can enumerate files and directories just prior to encryption.[2]

EnterpriseT1222.001File and Directory Permissions Modification:Windows File and Directory Permissions Modification

WastedLocker has a command to take ownership of a file and reset the ACL permissions using thetakeown.exe /F filepath command.[2]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

WastedLocker has copied a random file from the Windows System32 folder to the%APPDATA% location under a different hidden filename.[2]

.004Hide Artifacts:NTFS File Attributes

WastedLocker has the ability to save and execute files as an alternate data stream (ADS).[3]

EnterpriseT1574.001Hijack Execution Flow:DLL

WastedLocker has performed DLL hijacking before execution.[2]

EnterpriseT1490Inhibit System Recovery

WastedLocker can delete shadow volumes.[1][2][3]

EnterpriseT1112Modify Registry

WastedLocker can modify registry values within theSoftware\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.[2]

EnterpriseT1106Native API

WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.[2]

EnterpriseT1135Network Share Discovery

WastedLocker can identify network adjacent and accessible drives.[3]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

TheWastedLocker payload includes encrypted strings stored within the .bss section of the binary file.[2]

.016Obfuscated Files or Information:Junk Code Insertion

WastedLocker contains junk code to increase its entropy and hide the actual code.[2]

EnterpriseT1120Peripheral Device Discovery

WastedLocker can enumerate removable drives prior to the encryption process.[3]

EnterpriseT1012Query Registry

WastedLocker checks for specific registry keys related to theUCOMIEnumConnections andIActiveScriptParseProcedure32 interfaces.[2]

EnterpriseT1569.002System Services:Service Execution

WastedLocker can execute itself as a service.[2]

EnterpriseT1497.001Virtualization/Sandbox Evasion:System Checks

WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.[2]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp