Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-04-2023 15:58
Behavioral task
behavioral1
Sample
Medusa1.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Medusa1.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
Medusa1.bin.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-55-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-242-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-312-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-440-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-967-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/860-971-0x0000000000A90000-0x0000000000B42000-memory.dmp family_medusalocker behavioral1/memory/1668-974-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-978-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker behavioral1/memory/1668-980-0x00000000008B0000-0x0000000000962000-memory.dmp family_medusalocker -
Processes:
Medusa1.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Medusa1.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Medusa1.bin.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Medusa1.bin.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\CopyWrite.tiff Medusa1.bin.exe File renamed C:\Users\Admin\Pictures\CopyWrite.tiff => C:\Users\Admin\Pictures\CopyWrite.tiff.marlock07 Medusa1.bin.exe File renamed C:\Users\Admin\Pictures\NewInitialize.crw => C:\Users\Admin\Pictures\NewInitialize.crw.marlock07 Medusa1.bin.exe File renamed C:\Users\Admin\Pictures\SplitTest.png => C:\Users\Admin\Pictures\SplitTest.png.marlock07 Medusa1.bin.exe File renamed C:\Users\Admin\Pictures\StartProtect.crw => C:\Users\Admin\Pictures\StartProtect.crw.marlock07 Medusa1.bin.exe File renamed C:\Users\Admin\Pictures\UninstallPing.tif => C:\Users\Admin\Pictures\UninstallPing.tif.marlock07 Medusa1.bin.exe -
Executes dropped EXE 1 IoCs
Processes:
svhost.exepid process 860 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1668-55-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-242-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-312-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-440-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-967-0x00000000008B0000-0x0000000000962000-memory.dmp upx C:\Users\Admin\AppData\Roaming\svhost.exe upx C:\Users\Admin\AppData\Roaming\svhost.exe upx behavioral1/memory/860-971-0x0000000000A90000-0x0000000000B42000-memory.dmp upx behavioral1/memory/1668-974-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-978-0x00000000008B0000-0x0000000000962000-memory.dmp upx behavioral1/memory/1668-980-0x00000000008B0000-0x0000000000962000-memory.dmp upx -
Processes:
Medusa1.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Medusa1.bin.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
Medusa1.bin.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3499517378-2376672570-1134980332-1000\desktop.ini Medusa1.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Medusa1.bin.exedescription ioc process File opened (read-only) \??\J: Medusa1.bin.exe File opened (read-only) \??\L: Medusa1.bin.exe File opened (read-only) \??\O: Medusa1.bin.exe File opened (read-only) \??\U: Medusa1.bin.exe File opened (read-only) \??\Z: Medusa1.bin.exe File opened (read-only) \??\K: Medusa1.bin.exe File opened (read-only) \??\N: Medusa1.bin.exe File opened (read-only) \??\P: Medusa1.bin.exe File opened (read-only) \??\Y: Medusa1.bin.exe File opened (read-only) \??\V: Medusa1.bin.exe File opened (read-only) \??\X: Medusa1.bin.exe File opened (read-only) \??\H: Medusa1.bin.exe File opened (read-only) \??\Q: Medusa1.bin.exe File opened (read-only) \??\R: Medusa1.bin.exe File opened (read-only) \??\S: Medusa1.bin.exe File opened (read-only) \??\G: Medusa1.bin.exe File opened (read-only) \??\I: Medusa1.bin.exe File opened (read-only) \??\M: Medusa1.bin.exe File opened (read-only) \??\T: Medusa1.bin.exe File opened (read-only) \??\A: Medusa1.bin.exe File opened (read-only) \??\B: Medusa1.bin.exe File opened (read-only) \??\E: Medusa1.bin.exe File opened (read-only) \??\F: Medusa1.bin.exe File opened (read-only) \??\W: Medusa1.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 1916 vssadmin.exe 1956 vssadmin.exe 556 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Medusa1.bin.exepid process 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe 1668 Medusa1.bin.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
vssvc.exewmic.exewmic.exewmic.exedescription pid process Token: SeBackupPrivilege 688 vssvc.exe Token: SeRestorePrivilege 688 vssvc.exe Token: SeAuditPrivilege 688 vssvc.exe Token: SeIncreaseQuotaPrivilege 1256 wmic.exe Token: SeSecurityPrivilege 1256 wmic.exe Token: SeTakeOwnershipPrivilege 1256 wmic.exe Token: SeLoadDriverPrivilege 1256 wmic.exe Token: SeSystemProfilePrivilege 1256 wmic.exe Token: SeSystemtimePrivilege 1256 wmic.exe Token: SeProfSingleProcessPrivilege 1256 wmic.exe Token: SeIncBasePriorityPrivilege 1256 wmic.exe Token: SeCreatePagefilePrivilege 1256 wmic.exe Token: SeBackupPrivilege 1256 wmic.exe Token: SeRestorePrivilege 1256 wmic.exe Token: SeShutdownPrivilege 1256 wmic.exe Token: SeDebugPrivilege 1256 wmic.exe Token: SeSystemEnvironmentPrivilege 1256 wmic.exe Token: SeRemoteShutdownPrivilege 1256 wmic.exe Token: SeUndockPrivilege 1256 wmic.exe Token: SeManageVolumePrivilege 1256 wmic.exe Token: 33 1256 wmic.exe Token: 34 1256 wmic.exe Token: 35 1256 wmic.exe Token: SeIncreaseQuotaPrivilege 1904 wmic.exe Token: SeSecurityPrivilege 1904 wmic.exe Token: SeTakeOwnershipPrivilege 1904 wmic.exe Token: SeLoadDriverPrivilege 1904 wmic.exe Token: SeSystemProfilePrivilege 1904 wmic.exe Token: SeSystemtimePrivilege 1904 wmic.exe Token: SeProfSingleProcessPrivilege 1904 wmic.exe Token: SeIncBasePriorityPrivilege 1904 wmic.exe Token: SeCreatePagefilePrivilege 1904 wmic.exe Token: SeBackupPrivilege 1904 wmic.exe Token: SeRestorePrivilege 1904 wmic.exe Token: SeShutdownPrivilege 1904 wmic.exe Token: SeDebugPrivilege 1904 wmic.exe Token: SeSystemEnvironmentPrivilege 1904 wmic.exe Token: SeRemoteShutdownPrivilege 1904 wmic.exe Token: SeUndockPrivilege 1904 wmic.exe Token: SeManageVolumePrivilege 1904 wmic.exe Token: 33 1904 wmic.exe Token: 34 1904 wmic.exe Token: 35 1904 wmic.exe Token: SeIncreaseQuotaPrivilege 1996 wmic.exe Token: SeSecurityPrivilege 1996 wmic.exe Token: SeTakeOwnershipPrivilege 1996 wmic.exe Token: SeLoadDriverPrivilege 1996 wmic.exe Token: SeSystemProfilePrivilege 1996 wmic.exe Token: SeSystemtimePrivilege 1996 wmic.exe Token: SeProfSingleProcessPrivilege 1996 wmic.exe Token: SeIncBasePriorityPrivilege 1996 wmic.exe Token: SeCreatePagefilePrivilege 1996 wmic.exe Token: SeBackupPrivilege 1996 wmic.exe Token: SeRestorePrivilege 1996 wmic.exe Token: SeShutdownPrivilege 1996 wmic.exe Token: SeDebugPrivilege 1996 wmic.exe Token: SeSystemEnvironmentPrivilege 1996 wmic.exe Token: SeRemoteShutdownPrivilege 1996 wmic.exe Token: SeUndockPrivilege 1996 wmic.exe Token: SeManageVolumePrivilege 1996 wmic.exe Token: 33 1996 wmic.exe Token: 34 1996 wmic.exe Token: 35 1996 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Medusa1.bin.exetaskeng.exedescription pid process target process PID 1668 wrote to memory of 556 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 556 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 556 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 556 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1256 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1256 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1256 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1256 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1916 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1916 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1916 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1916 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1904 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1904 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1904 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1904 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1956 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1956 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1956 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1956 1668 Medusa1.bin.exe vssadmin.exe PID 1668 wrote to memory of 1996 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1996 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1996 1668 Medusa1.bin.exe wmic.exe PID 1668 wrote to memory of 1996 1668 Medusa1.bin.exe wmic.exe PID 1216 wrote to memory of 860 1216 taskeng.exe svhost.exe PID 1216 wrote to memory of 860 1216 taskeng.exe svhost.exe PID 1216 wrote to memory of 860 1216 taskeng.exe svhost.exe PID 1216 wrote to memory of 860 1216 taskeng.exe svhost.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
Medusa1.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Medusa1.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Medusa1.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Medusa1.bin.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Medusa1.bin.exe"C:\Users\Admin\AppData\Local\Temp\Medusa1.bin.exe"1⤵
- UAC bypass
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1668 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:556
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1916
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1956
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:688
-
C:\Windows\system32\taskeng.exetaskeng.exe {DBA0AB3C-9B96-42C1-8B4E-9F8D6353F123} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD512f1cf3c6433ad4907c9e31766880d44
SHA1995b3e979d42d5e600a6e3c1e56258ff339cd4df
SHA256098532b5acb8220480a7e19c43574a2f42ae760af73ed48c9cf9e7973a1d68cc
SHA512f368fc27cbf0464425e856cb018123b8fd371e17e9f2ceacac187ace0f932b4e1e2df7334b8d8fd08113c95c545de594eaefab815672dffd39bcdffe70badffe
-
Filesize
235KB
MD5f6f120d1262b88f79debb5d848ac7db9
SHA11339282f9b2d2a41326daf3cf284ec2ae8f0f93c
SHA2561bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
SHA5121067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
Filesize
235KB
MD5f6f120d1262b88f79debb5d848ac7db9
SHA11339282f9b2d2a41326daf3cf284ec2ae8f0f93c
SHA2561bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
SHA5121067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
Filesize
536B
MD5988b2102329078c57958ad1bfafcbfa1
SHA178cd9c7f197a3e865687d36732101059ade3ce1b
SHA256cdf6b61aaf1aecd939afd37d65ea514d56dcd9e5eaa3741da5461abc04e579ba
SHA5125726fba649c67ed4f7685cb682a6b485155bd084832ad0aaf6e8410256020d54972ce334bf9e685dfedd97bd2d0f5b82367c17469d7870c7d87e5af738dcf194