Analysis

  • max time kernel
    126s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    15-04-2021 07:47

General

  • Target

    Gr_rs.exe

  • Size

    678KB

  • MD5

    7684408e648ed2c462817083cd61d6d5

  • SHA1

    8dc1ba94b3b2996dcf45aa2b73730ff636fbed2e

  • SHA256

    b0f6d7c7a168f77b93aa42d7dc22a0118f98f525c14272467ff37c34217417d9

  • SHA512

    00224011cae9e86fac9f394b52b5267166f3bfc6ac6fe34594aaebd53c74f64f716bebdf1e9ad30072d0f800e22680597b766aca8dcc0d57c9f43d39092b7f55

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\Recovery_Instructions.html

Family

medusalocker

Ransom Note
Your personal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ll your important files have been encrypted! Your files are safe! Only modified. (RSA+AES) ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT. DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES. No software available on internet can help you. We are the only ones able to solve your problem. We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future.. We only seek money and our goal is not to damage your reputation or prevent your business from running. You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back. Contact us for price and get decryption software. http://gvlay6u4g53rxdi5.onion/8-Ww5sCBhsL8eM4PeAgsfgfa9lrqa81r31-c5EO4jlAOS7D8NCgbfZhNaL4wpxKeGEy * Note that this server is available via Tor browser only Follow the instructions to open the link: 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site. 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it. 3. Now you have Tor browser. In the Tor Browser open "{{URL}}". 4. Start a chat and follow the further instructions. If you can not use the above link, use the email: support@imfoodst.com support@securycasts.com * To contact us, create a new mail on the site: protonmail.com Make contact as soon as possible. Your private key (decryption key) is only stored temporarily. IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.
Emails

support@imfoodst.com support@securycasts.com

URLs

http://gvlay6u4g53rxdi5.onion/8-Ww5sCBhsL8eM4PeAgsfgfa9lrqa81r31-c5EO4jlAOS7D8NCgbfZhNaL4wpxKeGEy

Signatures

  • UAC bypass 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Gr_rs.exe
    "C:\Users\Admin\AppData\Local\Temp\Gr_rs.exe"
    1⤵
    • Modifies extensions of user files
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2112
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:496
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3480
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3528
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:1092
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3852
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2648
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3676
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1580
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3848
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4148
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:4212
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4460
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4500
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4708
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4772
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4996

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Privilege Escalation

    Bypass User Account Control

    1
    T1088

    Defense Evasion

    Bypass User Account Control

    1
    T1088

    Disabling Security Tools

    1
    T1089

    Modify Registry

    3
    T1112

    File Deletion

    2
    T1107

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
      MD5

      77358288a63c83d3b9d042c28ac9d8fb

      SHA1

      9213d9e0ac7fadf797bcc660b9035331735f8fd6

      SHA256

      9802e00285e47df1190917a681067f6e93cd067a70292b388891be1bb451ab8a

      SHA512

      9c6265ea1540331ab67e2c3b3f78a5a126e9fc1436df7b9bbe6f4977e4e7151dc1c94497a460e799b2316f28f94afb3f30eaba14b89381a9d00d3d072f8061b7

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk
      MD5

      ba306bf7897b8b5c7ea594adda251554

      SHA1

      32a2a66af0b35114500da76d1baea7f0f46055a7

      SHA256

      941299067cfe8ef3a45b2719cdbcd862fff890644624c15d18f20474f5b1b17b

      SHA512

      8ccf01009b101fab0e59ccc7efc12dd72cc14cf9f3d9e732e1588d5f72f685b744d656643147f59819e07016707ebd20825f8d65d20927d7bc8c056fea12c724

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb
      MD5

      641e386bb107cafc0f150402a13787e9

      SHA1

      155ecd760c5186abc08edbc3e21175db77ed80da

      SHA256

      c93eb5af7dbb3895f6958e566cb289ff2e243f6d0ed85ddd6a3af53fb4c342fb

      SHA512

      a28ffffd30c8ea42eef0cc008e9c0774cdf38d1a9679d1299f22bdff9221f7223979cae65f913fbb0aa17d6d4f57aa7fdf52d3abc159a6132970938de051a646

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm
      MD5

      9401f6e95559dcb40cc88d13a402cb6c

      SHA1

      6e444d35343a42a3f0cedc25f71bdfa27ea9b190

      SHA256

      e9010285b4d96b1628ef891d083106ecfb4d93075a3b037a22ff846206ba254c

      SHA512

      646d45dab75d36dbab4b997777b068044a63418487db20d004dcb233c5724f637b0fe37fde4b2fb437e2c0ba73321f3cdb3434a9506797de6107f37112ce5ef9

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{4D6F6E5B-603B-4A35-A142-62EDB5739F6C}.dat
      MD5

      e4c094a3f23d10f3257a0afe5016eac1

      SHA1

      c0f724552700dc15e2c100786b0c000549a00a32

      SHA256

      e1cf4fb3bf8d80246c0d3feb463e2b9ca81e84922f990b69976bc4457d6ab819

      SHA512

      1bf2a5358952269247f2b9278e85c1fe5adf4fa9de1c8cf64647ee4fdc5e8027ff6f114974d20dcaacbf685caca8e1a13a82c249f5f7a15b74ed8065c2da8e74

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{1A42B863-F8AA-4D4A-A7E9-45B138A18888}.dat
      MD5

      c6032bcfd17b05bb8c76a041d9301afb

      SHA1

      7ca73656cd16d8ac7857383fa0ee8194b634d749

      SHA256

      75b738bd5c3a350e702c88e4a302a73d7297fea038887bc343874336ecca4659

      SHA512

      22e36b94696a0f5106f332d1ead9720f8b26c89359ea9682a15a2b3e06c2df34345dca8460a24d4240aa1026ad9f2949cbb0c00ea3612659b5b0cee8060aa381

    • C:\Users\Admin\Desktop\Recovery_Instructions.html
      MD5

      bdbd1767eb0328efa1bab608cf2bb9c4

      SHA1

      680be04d7df36b035f88006d6e636cf70d6e74d0

      SHA256

      e2273a0e6086985635b54b78ced76e92a7e4295b8346993d49ebda3b3f018020

      SHA512

      b69fb25b867087f18e06f9a679fe96b113f484a54e91b91ece606d2817e35c3c776c15e359a0d74c9cacf996ecbcbc3ec042ae4d8c6cfdd6658741b212a9aac0

    • memory/496-114-0x0000000000000000-mapping.dmp
    • memory/1092-118-0x0000000000000000-mapping.dmp
    • memory/2452-115-0x0000000000000000-mapping.dmp
    • memory/3480-116-0x0000000000000000-mapping.dmp
    • memory/3528-117-0x0000000000000000-mapping.dmp
    • memory/3852-119-0x0000000000000000-mapping.dmp