Malware Analysis Report

2024-09-11 01:52

Sample ID 230926-w7fzzsea94
Target 2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe
SHA256 704381fe2d234c45355135639671982d9c592662ef1e6263db78d2aadd7e8eb8
Tags
medusalocker
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

704381fe2d234c45355135639671982d9c592662ef1e6263db78d2aadd7e8eb8

Threat Level: Known bad

The file 2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe was found to be: Known bad.

Malicious Activity Summary

medusalocker

MedusaLocker payload

Medusalocker family

Program crash

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-09-26 18:33

Signatures

MedusaLocker payload

Description Indicator Process Target
N/A N/A N/A N/A

Medusalocker family

medusalocker

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-26 18:33

Reported

2023-09-26 18:36

Platform

win7-20230831-en

Max time kernel

118s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe

"C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 216

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-26 18:33

Reported

2023-09-26 18:37

Platform

win10v2004-20230915-en

Max time kernel

194s

Max time network

214s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe

"C:\Users\Admin\AppData\Local\Temp\2023-08-26_821d0098dfec5bdf9df9fc1a41f36288_cobalt-strike_medusa-locker_JC.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3740 -ip 3740

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 584

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp

Files

N/A