WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.[1][2][3]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control |
WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.[2] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
WastedLocker has used cmd to execute commands on the system.[2] |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
WastedLocker created and established a service that runs until the encryption process is complete.[2] |
Enterprise | T1486 | Data Encrypted for Impact |
WastedLocker can encrypt data and leave a ransom note.[1][2][3] |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.[2] |
|
Enterprise | T1083 | File and Directory Discovery |
WastedLocker can enumerate files and directories just prior to encryption.[2] |
|
Enterprise | T1222 | .001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification |
WastedLocker has a command to take ownership of a file and reset the ACL permissions using the |
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
WastedLocker has copied a random file from the Windows System32 folder to the |
.004 | Hide Artifacts: NTFS File Attributes |
WastedLocker has the ability to save and execute files as an alternate data stream (ADS).[3] |
||
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
WastedLocker has performed DLL hijacking before execution.[2] |
Enterprise | T1490 | Inhibit System Recovery |
WastedLocker can delete shadow volumes.[1][2][3] |
|
Enterprise | T1112 | Modify Registry |
WastedLocker can modify registry values within the |
|
Enterprise | T1106 | Native API |
WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.[2] |
|
Enterprise | T1135 | Network Share Discovery |
WastedLocker can identify network adjacent and accessible drives.[3] |
|
Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding |
WastedLocker contains junk code to increase its entropy and hide the actual code.[2] |
.013 | Obfuscated Files or Information: Encrypted/Encoded File |
The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.[2] |
||
Enterprise | T1120 | Peripheral Device Discovery |
WastedLocker can enumerate removable drives prior to the encryption process.[3] |
|
Enterprise | T1012 | Query Registry |
WastedLocker checks for specific registry keys related to the |
|
Enterprise | T1569 | .002 | System Services: Service Execution |
WastedLocker can execute itself as a service.[2] |
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.[2] |