Analysis
-
max time kernel
170s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
30/01/2022, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1.exe
Resource
win10-en-20211208
General
-
Target
1.exe
-
Size
666KB
-
MD5
3f9c6aaa326c9df1efd1d26c1481b049
-
SHA1
eaf4f5287a2c8a71aebac36aef6dd78c0a58281e
-
SHA256
465ab4311a7db9f0bc10921cf6a0da7a746c4023dd78fdcec1c253eee69e5b9d
-
SHA512
6a38af9ade3c9111f6aaf13ec1d2879d71bbc40c7a5916a585e0be56f4795919e22f5c3dd02cc270adfcde76a68495f5e5ae79c62bf7c31b8842f910b8493b82
Malware Config
Extracted
C:\odt\!_HOW_RECOVERY_FILES_!.HTML
href="mailto:[email protected]">[email protected]</a><br>
href="mailto:[email protected]">[email protected]</a>
http-equiv="X-UA-Compatible"
http://meyerweb.com/eric/tools/css/reset/
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\RepairSplit.tiff 1.exe File renamed C:\Users\Admin\Pictures\RepairSplit.tiff => C:\Users\Admin\Pictures\RepairSplit.tiff.keversen 1.exe File opened for modification C:\Users\Admin\Pictures\SkipOut.tiff 1.exe File renamed C:\Users\Admin\Pictures\SkipOut.tiff => C:\Users\Admin\Pictures\SkipOut.tiff.keversen 1.exe File renamed C:\Users\Admin\Pictures\TestLimit.crw => C:\Users\Admin\Pictures\TestLimit.crw.keversen 1.exe File renamed C:\Users\Admin\Pictures\UnpublishUninstall.raw => C:\Users\Admin\Pictures\UnpublishUninstall.raw.keversen 1.exe File renamed C:\Users\Admin\Pictures\UseWatch.raw => C:\Users\Admin\Pictures\UseWatch.raw.keversen 1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-369956170-74428499-1628131376-1000\desktop.ini 1.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 1.exe File opened (read-only) \??\K: 1.exe File opened (read-only) \??\L: 1.exe File opened (read-only) \??\N: 1.exe File opened (read-only) \??\X: 1.exe File opened (read-only) \??\F: 1.exe File opened (read-only) \??\O: 1.exe File opened (read-only) \??\R: 1.exe File opened (read-only) \??\Y: 1.exe File opened (read-only) \??\Z: 1.exe File opened (read-only) \??\S: 1.exe File opened (read-only) \??\A: 1.exe File opened (read-only) \??\B: 1.exe File opened (read-only) \??\E: 1.exe File opened (read-only) \??\G: 1.exe File opened (read-only) \??\I: 1.exe File opened (read-only) \??\M: 1.exe File opened (read-only) \??\P: 1.exe File opened (read-only) \??\T: 1.exe File opened (read-only) \??\U: 1.exe File opened (read-only) \??\V: 1.exe File opened (read-only) \??\W: 1.exe File opened (read-only) \??\J: 1.exe File opened (read-only) \??\Q: 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2168 vssadmin.exe 712 vssadmin.exe 1416 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe 3048 1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 584 vssvc.exe Token: SeRestorePrivilege 584 vssvc.exe Token: SeAuditPrivilege 584 vssvc.exe Token: SeIncreaseQuotaPrivilege 3744 wmic.exe Token: SeSecurityPrivilege 3744 wmic.exe Token: SeTakeOwnershipPrivilege 3744 wmic.exe Token: SeLoadDriverPrivilege 3744 wmic.exe Token: SeSystemProfilePrivilege 3744 wmic.exe Token: SeSystemtimePrivilege 3744 wmic.exe Token: SeProfSingleProcessPrivilege 3744 wmic.exe Token: SeIncBasePriorityPrivilege 3744 wmic.exe Token: SeCreatePagefilePrivilege 3744 wmic.exe Token: SeBackupPrivilege 3744 wmic.exe Token: SeRestorePrivilege 3744 wmic.exe Token: SeShutdownPrivilege 3744 wmic.exe Token: SeDebugPrivilege 3744 wmic.exe Token: SeSystemEnvironmentPrivilege 3744 wmic.exe Token: SeRemoteShutdownPrivilege 3744 wmic.exe Token: SeUndockPrivilege 3744 wmic.exe Token: SeManageVolumePrivilege 3744 wmic.exe Token: 33 3744 wmic.exe Token: 34 3744 wmic.exe Token: 35 3744 wmic.exe Token: 36 3744 wmic.exe Token: SeIncreaseQuotaPrivilege 1204 wmic.exe Token: SeSecurityPrivilege 1204 wmic.exe Token: SeTakeOwnershipPrivilege 1204 wmic.exe Token: SeLoadDriverPrivilege 1204 wmic.exe Token: SeSystemProfilePrivilege 1204 wmic.exe Token: SeSystemtimePrivilege 1204 wmic.exe Token: SeProfSingleProcessPrivilege 1204 wmic.exe Token: SeIncBasePriorityPrivilege 1204 wmic.exe Token: SeCreatePagefilePrivilege 1204 wmic.exe Token: SeBackupPrivilege 1204 wmic.exe Token: SeRestorePrivilege 1204 wmic.exe Token: SeShutdownPrivilege 1204 wmic.exe Token: SeDebugPrivilege 1204 wmic.exe Token: SeSystemEnvironmentPrivilege 1204 wmic.exe Token: SeRemoteShutdownPrivilege 1204 wmic.exe Token: SeUndockPrivilege 1204 wmic.exe Token: SeManageVolumePrivilege 1204 wmic.exe Token: 33 1204 wmic.exe Token: 34 1204 wmic.exe Token: 35 1204 wmic.exe Token: 36 1204 wmic.exe Token: SeIncreaseQuotaPrivilege 368 wmic.exe Token: SeSecurityPrivilege 368 wmic.exe Token: SeTakeOwnershipPrivilege 368 wmic.exe Token: SeLoadDriverPrivilege 368 wmic.exe Token: SeSystemProfilePrivilege 368 wmic.exe Token: SeSystemtimePrivilege 368 wmic.exe Token: SeProfSingleProcessPrivilege 368 wmic.exe Token: SeIncBasePriorityPrivilege 368 wmic.exe Token: SeCreatePagefilePrivilege 368 wmic.exe Token: SeBackupPrivilege 368 wmic.exe Token: SeRestorePrivilege 368 wmic.exe Token: SeShutdownPrivilege 368 wmic.exe Token: SeDebugPrivilege 368 wmic.exe Token: SeSystemEnvironmentPrivilege 368 wmic.exe Token: SeRemoteShutdownPrivilege 368 wmic.exe Token: SeUndockPrivilege 368 wmic.exe Token: SeManageVolumePrivilege 368 wmic.exe Token: 33 368 wmic.exe Token: 34 368 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2168 3048 1.exe 68 PID 3048 wrote to memory of 2168 3048 1.exe 68 PID 3048 wrote to memory of 2168 3048 1.exe 68 PID 3048 wrote to memory of 3744 3048 1.exe 73 PID 3048 wrote to memory of 3744 3048 1.exe 73 PID 3048 wrote to memory of 3744 3048 1.exe 73 PID 3048 wrote to memory of 712 3048 1.exe 75 PID 3048 wrote to memory of 712 3048 1.exe 75 PID 3048 wrote to memory of 712 3048 1.exe 75 PID 3048 wrote to memory of 1204 3048 1.exe 77 PID 3048 wrote to memory of 1204 3048 1.exe 77 PID 3048 wrote to memory of 1204 3048 1.exe 77 PID 3048 wrote to memory of 1416 3048 1.exe 79 PID 3048 wrote to memory of 1416 3048 1.exe 79 PID 3048 wrote to memory of 1416 3048 1.exe 79 PID 3048 wrote to memory of 368 3048 1.exe 81 PID 3048 wrote to memory of 368 3048 1.exe 81 PID 3048 wrote to memory of 368 3048 1.exe 81 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3048 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2168
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:712
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1416
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:584