Analysis

  • max time kernel
    172s
  • max time network
    2s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 15:52

General

  • Target

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe

  • Size

    669KB

  • MD5

    1a2f56aa0186b98dc77f5f493cd592b4

  • SHA1

    fbf4c6cc257bd31c9c1628e805ce85b14284713a

  • SHA256

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

  • SHA512

    07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

Malware Config

Extracted

Path

\??\Z:\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">A81AE199815906E68797048F932C06DBA3E11BBFDCED9988465F5DAE05B438E3AACE518837CF034E45D434C768E9CC3DA4BE6BAC964AA6C35D6BE7EB4B380243<br>C8D4C4353445E27E25C9C8FF32EA501BCEA09E321D96360F5CBEBA42C3170F67F07F97224B813C6E4C17663A9F14DEE9063885D3A8109531D8990C8D65C1<br>E2CCAB1A09C97EC3FCC5F61F6EE1DE52C444D70BF44CA13A7FEC4842AE0AD0E0AE43BCB4B23159680BF4220F35FA1EF16423732377ABCADC50EFD7ABE8B6<br>6D16E958566A843CC39887B31BA7EB7204E50456C206AD14A099969133CD0EDE57C80B5D25E2131B35EB543C2A792CC216ABCE8B5266801FD4683352F567<br>0541F0632E0132C0D47FEA0C00535DEE89240E1DE918082D40CF49B880937FF58225CB1671EFA3334A0A877361C559DBD2B0441A5558BDD38B2A1CCE58CB<br>D398AF72C41EC7B35103380B20D83FA00C1B656A614AED6A9480872D33FE49B7F0FFF7E734B5EDA928A49661A2C6713EF8BD2A2401E4AAE12EB319CD825D<br>722ABC4EDCB20784E7073738C9CDEF76C032D8458E2B375257E47D198CB643A3043D2913AEDFE030CCAB5198C9DC8AB57D3724C4C209247297DA25818D2E<br>94AC4E249AA709ED702F886A6EBEABB64C1D514BB6F98344519BD8DD7332CDFFB7D593B7EDC63C954E4EAC03F8DBA415FC6936E2CF391044397B168C5121<br>ACFAC6B2E4030609EA241629E381</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>ALL YOUR IMPORTANT FILES HAVE BEEN ENCRYPTED!</b><br><br> YOUR FILES ARE SAFE! JUST MODIFIED ONLY. (RSA+AES) <br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMENANTLY DESTROY YOUR FILE.<br> DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES.<br><br> NO SOFTWARE AVAILABLE ON INTERNET CAN HELP YOU. WE ONLY HAVE<br> SOLUTION TO YOUR PROBLEM.<br><br> WE GATHERED HIGHLY CONFIDENTIAL/PERSORNAL DATA. THESE DATA<br> ARE CURRENTLY STORED ON A PRIVATE SERVER. THIS SERVER WILL BE<br> IMMEDIATELY DESTROYED AFTER YOUR PAYMENT. WE ONLY SEEK MONEY<br> AND DO NOT WANT TO DAMAGE YOUR REPUTATION. IF YOU DECIDE TO<br> NOT PAY, WE WILL RELEASE THIS DATA TO PUBLIC OR RE-SELLER.<br><br> YOU WILL CAN SEND US 2-3 NON-IMPORTANT FILES AND WE WILL<br> DECRYPT IT FOR FREE TO PROVE WE ARE ABLE TO GIVE YOUR FILES<br> BACK.<br><br> <!--text data --> <hr> <b>CONTACT US FOR PRICE (BITCOIN) AND GET DECRYPTION SOFTWARE.</b><br><br> <a href="[email protected]">[email protected]</a><br> <a href="[email protected] ? ">[email protected] </a> <hr> </div> <div class="text"> MAKE CONTACT AS SOON AS POSSIBLE. YOUR DECRYPTION KEY IS ONLY STORED <br> TEMPORARLY. IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER. </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker Payload 2 IoCs
  • UAC bypass 3 TTPs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe
    "C:\Users\Admin\AppData\Local\Temp\0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1700
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:520
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1400
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:652
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1204
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:1916
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1224
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:560
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {1FA62518-5F52-420E-9095-3ED3005AB33E} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Roaming\svhost.exe
      C:\Users\Admin\AppData\Roaming\svhost.exe
      2⤵
      • Executes dropped EXE
      PID:964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svhost.exe

    MD5

    1a2f56aa0186b98dc77f5f493cd592b4

    SHA1

    fbf4c6cc257bd31c9c1628e805ce85b14284713a

    SHA256

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

    SHA512

    07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

  • C:\Users\Admin\AppData\Roaming\svhost.exe

    MD5

    1a2f56aa0186b98dc77f5f493cd592b4

    SHA1

    fbf4c6cc257bd31c9c1628e805ce85b14284713a

    SHA256

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

    SHA512

    07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

  • memory/1700-55-0x00000000758A1000-0x00000000758A3000-memory.dmp

    Filesize

    8KB