Analysis

  • max time kernel
    181s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 15:52

General

  • Target

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe

  • Size

    669KB

  • MD5

    1a2f56aa0186b98dc77f5f493cd592b4

  • SHA1

    fbf4c6cc257bd31c9c1628e805ce85b14284713a

  • SHA256

    0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

  • SHA512

    07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

Malware Config

Extracted

Path

C:\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">C67BD138C04C4BFABB2C821C87C3A3F34440A25608BC2A56133FE3C0E63613EE244A610F75571BC8B986A8C9AB59E012CF76D129AD6B526E6F57F00FEFBFA1B4<br>E0EE1D767EB06266D59DD3E62CDEB3560B92CEC22686A8D3EE5099908C0CDB717DDCDF2F6F20CC8CBB3ED9ACEF4A4CAAC2CA8A495113CADFFA457C31318A<br>4FA12A72DC74006630BCBC7D75DDFF86A45EFDD9D26085AB54EACC879BC672B96024B5DD944CB84854E942E1AF19C730C5DE602AC2CFFE8B1569F924CA76<br>3E3F0296C36269972D628843CA472AD5510F08B40D5E44B9FB17B777F9E86F749114ADC9C015D551DBE38C3C19A323DC2507136EB419DBEB265F1AFEE4D2<br>5B720242115412BB3E0AAB12D84C616CEFE8344FA37520370BAA6667C2F92C7719BA29D1C168EF2E1547D83F383C65883D777AEBAF675E4265D12BC0A5A3<br>7CC28B7BD869C5599EC8DE79CD0699327795634FBBCE7894EE0E2B61FADDA62D3E1BC1315A268511C8BDE28169E16B7C87688C9274D02E8E0E8558911354<br>C93465807F3D9F8674C1EA06B36FD10817FF424EB0A96FA6C41666AA76A75FF983615C71E6CEC8F553F46B0DF9A6143AD39262DAA015872E6AEE947549AC<br>5ACEACFF7C90166D5890FFFCABB1A2CDC76F9E1DE0E44EA29A7A981D24BCF974FCBB9FA6E98570240A976604C0632B786E51D4F81F4F175303F9E015F51A<br>E5FAFE72EFBCB45BADD1BFBC7084</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>ALL YOUR IMPORTANT FILES HAVE BEEN ENCRYPTED!</b><br><br> YOUR FILES ARE SAFE! JUST MODIFIED ONLY. (RSA+AES) <br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMENANTLY DESTROY YOUR FILE.<br> DO NOT MODIFY ENCRYPTED FILES. DO NOT RENAME ENCRYPTED FILES.<br><br> NO SOFTWARE AVAILABLE ON INTERNET CAN HELP YOU. WE ONLY HAVE<br> SOLUTION TO YOUR PROBLEM.<br><br> WE GATHERED HIGHLY CONFIDENTIAL/PERSORNAL DATA. THESE DATA<br> ARE CURRENTLY STORED ON A PRIVATE SERVER. THIS SERVER WILL BE<br> IMMEDIATELY DESTROYED AFTER YOUR PAYMENT. WE ONLY SEEK MONEY<br> AND DO NOT WANT TO DAMAGE YOUR REPUTATION. IF YOU DECIDE TO<br> NOT PAY, WE WILL RELEASE THIS DATA TO PUBLIC OR RE-SELLER.<br><br> YOU WILL CAN SEND US 2-3 NON-IMPORTANT FILES AND WE WILL<br> DECRYPT IT FOR FREE TO PROVE WE ARE ABLE TO GIVE YOUR FILES<br> BACK.<br><br> <!--text data --> <hr> <b>CONTACT US FOR PRICE (BITCOIN) AND GET DECRYPTION SOFTWARE.</b><br><br> <a href="[email protected]">[email protected]</a><br> <a href="[email protected] ? ">[email protected] </a> <hr> </div> <div class="text"> MAKE CONTACT AS SOON AS POSSIBLE. YOUR DECRYPTION KEY IS ONLY STORED <br> TEMPORARLY. IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER. </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker Payload 2 IoCs
  • UAC bypass 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe
    "C:\Users\Admin\AppData\Local\Temp\0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2364
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3308
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:212
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1304
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k wusvcs -p
    1⤵
      PID:636
    • C:\Users\Admin\AppData\Roaming\svhost.exe
      C:\Users\Admin\AppData\Roaming\svhost.exe
      1⤵
      • Executes dropped EXE
      PID:2936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\svhost.exe

      MD5

      1a2f56aa0186b98dc77f5f493cd592b4

      SHA1

      fbf4c6cc257bd31c9c1628e805ce85b14284713a

      SHA256

      0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

      SHA512

      07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901

    • C:\Users\Admin\AppData\Roaming\svhost.exe

      MD5

      1a2f56aa0186b98dc77f5f493cd592b4

      SHA1

      fbf4c6cc257bd31c9c1628e805ce85b14284713a

      SHA256

      0f3bc144689b4ba5a96b87f8ada895b0c7a283e72aa9c533d63d6959138ca531

      SHA512

      07ce5bf33ef1b65ff27747c11b010e918e9d3f7616f782174614ad1785c80064af7d55b78d8f81e69c2b6f40fe535823d7116919fc80368b1f0660a00103c901