Resubmissions

13-03-2023 21:04

230313-zwvwjsca84 10

11-03-2023 04:46

230311-fdzbgaac8v 10

Analysis

  • max time kernel
    89s
  • max time network
    91s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-03-2023 21:04

General

  • Target

    Medusa.bin.exe

  • Size

    661KB

  • MD5

    19ddac9782acd73f66c5fe040e86ddee

  • SHA1

    24ceba1e2951cde8e41939da21c6ba3030fc531d

  • SHA256

    dde3c98b6a370fb8d1785f3134a76cb465cd663db20dffe011da57a4de37aa95

  • SHA512

    e7be7472241fdd26db48dbd0311afe821905f6d59dfb56e3dc035944b7346b0767a8af76d110c5f60c0ba0183ca3791e56d9b3c8b9ba887afa111aafc949c1d4

  • SSDEEP

    12288:vN3K5e8nbwFigzk6VVMqX8aQNRMcauV9B/rtiPnA40Q8:hCXbwFigzkQVdXvlcayDh49

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\HOW_TO_RECOVER_DATA.html

Ransom Note
All your data are encrypted! Your files are encrypted, and currently unavailable. You can check it: all files on you computer has new expansion. By the way, everything is possible to recover (restore), but you need to buy a unique decryptor. Otherwise, you never cant return your data. [email protected] If you will get no answer within 24 hours contact us by our alternate emails: [email protected] Its just a business. If we do not do our work and liabilities - nobody will not cooperate with us. To verify the possibility of the recovery of your files we can decrypted 1 file for free. Attach 1 file to the letter (no more than 10Mb). Indicate your personal ID on the letter: 4C62F58FF7D01AC345C1E204EB1B968C035CAD34290E7A092788210E156365166AB40F48FDEE447D8EBDE7BDFFE8F7BB0D26B59FEEB5B7691DC8451B7E8F2634 917B08DCE7382B1507AFFD5C1A2E304D222A8E6D4EEEA9CAF55EDAE493CABD41B4C64392D6DF8B23DC2BFFDB9065172EEF1F01F8875F961FE39343365C0F 3B18BB9F72B328A03C81182D354B7115E787A69DC709840A66A37C76C36DDF3E48D1E6168E6AD517606CBD0CD6F36555FC7BC3FF1AB56C8D19588BF989CA 3ADC5487C77B9E27E3C80C004697AD1C6AB869F169F55105C85E7ACBE5B779CFEDFEACAF43170D721009AF118CBCCFFCCBB1022A3D9ECD80BB6C0D1F7B2A 063C3E2B32895E6EB2AD534E8D03EB53E0956FF0165572EEB8550BD8CFB480024C939A0C855935754DB3603C36ADC6FB9697F728A001388B0F9CDF334A66 BC36BC432BEACEA375E5C8F087664310FF62C742A3CACE42CCD4B9C94D27A596F0F665388862AE1690B7427512EE1D50D0049D117E10AE73BBA20DF01AC3 578D94F8184C5B4C8DBA007F76514C84909CDB0FC32ADE854903A16507EFF3F092E8D9488C40955BA41D3314D48B7DBE7DEB54B3EEF25E6D150CA1E009C6 B678FD7D357042C528AB57C3CCE095084E4609DFD4EEC64B091B9C1ACD61367ECD18011E2F082F5537AB12A2211D4F0C645CDE645BF60B620D5CA447A51F DAC3AFD24C3A9CE98FB8A7267C4C Attention! - Attempts of change files by yourself will result in a loose of data. - Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data. - Use any third party software for restoring your data or antivirus solutions will result in a loose of data. - Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data. - If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key.

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Medusa.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Medusa.bin.exe"
    1⤵
    • UAC bypass
    • Modifies extensions of user files
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3992
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3840
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3700
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5000
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3768
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3340
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4852
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4764
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3512
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -s Browser
      1⤵
      • Modifies data under HKEY_USERS
      PID:3196
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:820
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2056

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\.oracle_jre_usage\HOW_TO_RECOVER_DATA.html

      Filesize

      27KB

      MD5

      359637b05b997f8ac48e963fc81ebf88

      SHA1

      d5a4e5db3795f93b1ff151876e453ce03fe97166

      SHA256

      0eaa02294fb365c72326e1db3fecf257b31e050a11ff720e0dd62418b1ded924

      SHA512

      1a613804186965436bb07a499433e7d96b80bc473b23544ab330a1f801f98d4f4a2d0bd6a73fe5c8e204da44c4b004dee305d8abb89ac82b5fb5d3639535ebdc

    • C:\Users\Admin\Downloads\HOW_TO_RECOVER_DATA.html

      Filesize

      27KB

      MD5

      359637b05b997f8ac48e963fc81ebf88

      SHA1

      d5a4e5db3795f93b1ff151876e453ce03fe97166

      SHA256

      0eaa02294fb365c72326e1db3fecf257b31e050a11ff720e0dd62418b1ded924

      SHA512

      1a613804186965436bb07a499433e7d96b80bc473b23544ab330a1f801f98d4f4a2d0bd6a73fe5c8e204da44c4b004dee305d8abb89ac82b5fb5d3639535ebdc

    • memory/1428-977-0x000001B911710000-0x000001B911712000-memory.dmp

      Filesize

      8KB

    • memory/1428-975-0x000001B9116F0000-0x000001B9116F2000-memory.dmp

      Filesize

      8KB

    • memory/1428-973-0x000001B911630000-0x000001B911632000-memory.dmp

      Filesize

      8KB

    • memory/1428-971-0x000001B911610000-0x000001B911612000-memory.dmp

      Filesize

      8KB

    • memory/1428-969-0x000001B9114F0000-0x000001B9114F2000-memory.dmp

      Filesize

      8KB

    • memory/1428-966-0x000001B9114C0000-0x000001B9114C2000-memory.dmp

      Filesize

      8KB

    • memory/3768-658-0x00007FFC56F40000-0x00007FFC56F50000-memory.dmp

      Filesize

      64KB

    • memory/3768-653-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-915-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-651-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-652-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-914-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-654-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-657-0x00007FFC56F40000-0x00007FFC56F50000-memory.dmp

      Filesize

      64KB

    • memory/3768-913-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/3768-912-0x00007FFC5AAB0000-0x00007FFC5AAC0000-memory.dmp

      Filesize

      64KB

    • memory/4764-958-0x00000200DA120000-0x00000200DA122000-memory.dmp

      Filesize

      8KB

    • memory/4764-957-0x00000200DA040000-0x00000200DA042000-memory.dmp

      Filesize

      8KB

    • memory/4764-955-0x00000200D56C0000-0x00000200D56C2000-memory.dmp

      Filesize

      8KB

    • memory/4764-953-0x00000200D5260000-0x00000200D5261000-memory.dmp

      Filesize

      4KB

    • memory/4764-934-0x00000200D5400000-0x00000200D5410000-memory.dmp

      Filesize

      64KB

    • memory/4764-916-0x00000200D4E20000-0x00000200D4E30000-memory.dmp

      Filesize

      64KB

    • memory/4764-987-0x00000200D56D0000-0x00000200D56D2000-memory.dmp

      Filesize

      8KB

    • memory/4764-990-0x00000200D5260000-0x00000200D5261000-memory.dmp

      Filesize

      4KB

    • memory/4764-994-0x00000200D5240000-0x00000200D5241000-memory.dmp

      Filesize

      4KB