Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20/10/2021, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
B.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
B.exe
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
Build.exe
Resource
win7-en-20211014
Behavioral task
behavioral4
Sample
Build.exe
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
READ.exe
Resource
win7-en-20211014
Behavioral task
behavioral6
Sample
READ.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
rb.exe
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
rb.exe
Resource
win10-en-20210920
General
-
Target
rb.exe
-
Size
669KB
-
MD5
ae286ff258c5ec1d15a4fd3f64875d5b
-
SHA1
576b9e76e385b389f859ee4bde2d12776bbaedca
-
SHA256
ce0facb2c24c71a20117e27af3aed9d6815500eeadba6e79b472bef539d82769
-
SHA512
f2cf299e20571701ab7a7ad82103317279e8378f114e3de76b22580eb5e8263a025af1fb653b27323645e0ac63983dcbf6f609154a16e8e9d6c81531c369183b
Malware Config
Extracted
C:\Boot\HOW_TO_RECOVER_DATA.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompleteConvertFrom.raw => C:\Users\Admin\Pictures\CompleteConvertFrom.raw.reads rb.exe File renamed C:\Users\Admin\Pictures\ExportHide.raw => C:\Users\Admin\Pictures\ExportHide.raw.reads rb.exe File renamed C:\Users\Admin\Pictures\ExportInstall.tif => C:\Users\Admin\Pictures\ExportInstall.tif.reads rb.exe File renamed C:\Users\Admin\Pictures\PopFind.raw => C:\Users\Admin\Pictures\PopFind.raw.reads rb.exe File renamed C:\Users\Admin\Pictures\ResolveUninstall.tif => C:\Users\Admin\Pictures\ResolveUninstall.tif.reads rb.exe File renamed C:\Users\Admin\Pictures\UnpublishRequest.tif => C:\Users\Admin\Pictures\UnpublishRequest.tif.reads rb.exe File renamed C:\Users\Admin\Pictures\AssertInvoke.png => C:\Users\Admin\Pictures\AssertInvoke.png.reads rb.exe File renamed C:\Users\Admin\Pictures\BackupConvertFrom.tif => C:\Users\Admin\Pictures\BackupConvertFrom.tif.reads rb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" rb.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2481030822-2828258191-1606198294-1000\desktop.ini rb.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: rb.exe File opened (read-only) \??\A: rb.exe File opened (read-only) \??\B: rb.exe File opened (read-only) \??\F: rb.exe File opened (read-only) \??\K: rb.exe File opened (read-only) \??\O: rb.exe File opened (read-only) \??\P: rb.exe File opened (read-only) \??\T: rb.exe File opened (read-only) \??\Y: rb.exe File opened (read-only) \??\Z: rb.exe File opened (read-only) \??\I: rb.exe File opened (read-only) \??\J: rb.exe File opened (read-only) \??\R: rb.exe File opened (read-only) \??\V: rb.exe File opened (read-only) \??\W: rb.exe File opened (read-only) \??\H: rb.exe File opened (read-only) \??\L: rb.exe File opened (read-only) \??\M: rb.exe File opened (read-only) \??\N: rb.exe File opened (read-only) \??\Q: rb.exe File opened (read-only) \??\S: rb.exe File opened (read-only) \??\X: rb.exe File opened (read-only) \??\E: rb.exe File opened (read-only) \??\G: rb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3920 vssadmin.exe 1652 vssadmin.exe 1084 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe 2064 rb.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 864 vssvc.exe Token: SeRestorePrivilege 864 vssvc.exe Token: SeAuditPrivilege 864 vssvc.exe Token: SeIncreaseQuotaPrivilege 3924 wmic.exe Token: SeSecurityPrivilege 3924 wmic.exe Token: SeTakeOwnershipPrivilege 3924 wmic.exe Token: SeLoadDriverPrivilege 3924 wmic.exe Token: SeSystemProfilePrivilege 3924 wmic.exe Token: SeSystemtimePrivilege 3924 wmic.exe Token: SeProfSingleProcessPrivilege 3924 wmic.exe Token: SeIncBasePriorityPrivilege 3924 wmic.exe Token: SeCreatePagefilePrivilege 3924 wmic.exe Token: SeBackupPrivilege 3924 wmic.exe Token: SeRestorePrivilege 3924 wmic.exe Token: SeShutdownPrivilege 3924 wmic.exe Token: SeDebugPrivilege 3924 wmic.exe Token: SeSystemEnvironmentPrivilege 3924 wmic.exe Token: SeRemoteShutdownPrivilege 3924 wmic.exe Token: SeUndockPrivilege 3924 wmic.exe Token: SeManageVolumePrivilege 3924 wmic.exe Token: 33 3924 wmic.exe Token: 34 3924 wmic.exe Token: 35 3924 wmic.exe Token: 36 3924 wmic.exe Token: SeIncreaseQuotaPrivilege 1092 wmic.exe Token: SeSecurityPrivilege 1092 wmic.exe Token: SeTakeOwnershipPrivilege 1092 wmic.exe Token: SeLoadDriverPrivilege 1092 wmic.exe Token: SeSystemProfilePrivilege 1092 wmic.exe Token: SeSystemtimePrivilege 1092 wmic.exe Token: SeProfSingleProcessPrivilege 1092 wmic.exe Token: SeIncBasePriorityPrivilege 1092 wmic.exe Token: SeCreatePagefilePrivilege 1092 wmic.exe Token: SeBackupPrivilege 1092 wmic.exe Token: SeRestorePrivilege 1092 wmic.exe Token: SeShutdownPrivilege 1092 wmic.exe Token: SeDebugPrivilege 1092 wmic.exe Token: SeSystemEnvironmentPrivilege 1092 wmic.exe Token: SeRemoteShutdownPrivilege 1092 wmic.exe Token: SeUndockPrivilege 1092 wmic.exe Token: SeManageVolumePrivilege 1092 wmic.exe Token: 33 1092 wmic.exe Token: 34 1092 wmic.exe Token: 35 1092 wmic.exe Token: 36 1092 wmic.exe Token: SeIncreaseQuotaPrivilege 1412 wmic.exe Token: SeSecurityPrivilege 1412 wmic.exe Token: SeTakeOwnershipPrivilege 1412 wmic.exe Token: SeLoadDriverPrivilege 1412 wmic.exe Token: SeSystemProfilePrivilege 1412 wmic.exe Token: SeSystemtimePrivilege 1412 wmic.exe Token: SeProfSingleProcessPrivilege 1412 wmic.exe Token: SeIncBasePriorityPrivilege 1412 wmic.exe Token: SeCreatePagefilePrivilege 1412 wmic.exe Token: SeBackupPrivilege 1412 wmic.exe Token: SeRestorePrivilege 1412 wmic.exe Token: SeShutdownPrivilege 1412 wmic.exe Token: SeDebugPrivilege 1412 wmic.exe Token: SeSystemEnvironmentPrivilege 1412 wmic.exe Token: SeRemoteShutdownPrivilege 1412 wmic.exe Token: SeUndockPrivilege 1412 wmic.exe Token: SeManageVolumePrivilege 1412 wmic.exe Token: 33 1412 wmic.exe Token: 34 1412 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3920 2064 rb.exe 71 PID 2064 wrote to memory of 3920 2064 rb.exe 71 PID 2064 wrote to memory of 3920 2064 rb.exe 71 PID 2064 wrote to memory of 3924 2064 rb.exe 75 PID 2064 wrote to memory of 3924 2064 rb.exe 75 PID 2064 wrote to memory of 3924 2064 rb.exe 75 PID 2064 wrote to memory of 1652 2064 rb.exe 77 PID 2064 wrote to memory of 1652 2064 rb.exe 77 PID 2064 wrote to memory of 1652 2064 rb.exe 77 PID 2064 wrote to memory of 1092 2064 rb.exe 79 PID 2064 wrote to memory of 1092 2064 rb.exe 79 PID 2064 wrote to memory of 1092 2064 rb.exe 79 PID 2064 wrote to memory of 1084 2064 rb.exe 81 PID 2064 wrote to memory of 1084 2064 rb.exe 81 PID 2064 wrote to memory of 1084 2064 rb.exe 81 PID 2064 wrote to memory of 1412 2064 rb.exe 83 PID 2064 wrote to memory of 1412 2064 rb.exe 83 PID 2064 wrote to memory of 1412 2064 rb.exe 83 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" rb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" rb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rb.exe"C:\Users\Admin\AppData\Local\Temp\rb.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2064 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3920
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1652
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1084
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:864