Resubmissions
30-11-2023 10:51
231130-mx5qxsah79 1029-06-2023 20:59
230629-zs72psfa95 1029-06-2023 16:29
230629-tzp7ksec27 10Analysis
-
max time kernel
293s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
30-11-2023 10:51
Behavioral task
behavioral1
Sample
medusa.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
medusa.exe
Resource
win10-20231023-en
Behavioral task
behavioral3
Sample
medusa.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral4
Sample
medusa.exe
Resource
win11-20231128-en
General
-
Target
medusa.exe
-
Size
235KB
-
MD5
f6f120d1262b88f79debb5d848ac7db9
-
SHA1
1339282f9b2d2a41326daf3cf284ec2ae8f0f93c
-
SHA256
1bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
-
SHA512
1067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
SSDEEP
6144:c5vMUmRTTgwnfeP+Jx1cLNAIyBcc9WrEWUC4wQh/6BeX:/U8Tgufnx1cLNncgQWUUQh/+e
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 17 IoCs
resource yara_rule behavioral1/memory/1392-146-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-258-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-718-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-869-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-870-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1976-874-0x0000000000180000-0x0000000000232000-memory.dmp family_medusalocker behavioral1/memory/1392-877-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-878-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-879-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-881-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-882-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-895-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-896-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-897-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-898-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-899-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker behavioral1/memory/1392-900-0x0000000000130000-0x00000000001E2000-memory.dmp family_medusalocker -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (281) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 1976 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1392-0-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-146-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-258-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-718-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-869-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-870-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/files/0x000d00000001201d-871.dat upx behavioral1/files/0x000d00000001201d-872.dat upx behavioral1/memory/1976-873-0x0000000000180000-0x0000000000232000-memory.dmp upx behavioral1/memory/1976-874-0x0000000000180000-0x0000000000232000-memory.dmp upx behavioral1/memory/1392-877-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-878-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-879-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-881-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-882-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-895-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-896-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-897-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-898-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-899-0x0000000000130000-0x00000000001E2000-memory.dmp upx behavioral1/memory/1392-900-0x0000000000130000-0x00000000001E2000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2084844033-2744876406-2053742436-1000\desktop.ini medusa.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: medusa.exe File opened (read-only) \??\G: medusa.exe File opened (read-only) \??\I: medusa.exe File opened (read-only) \??\M: medusa.exe File opened (read-only) \??\W: medusa.exe File opened (read-only) \??\X: medusa.exe File opened (read-only) \??\Y: medusa.exe File opened (read-only) \??\F: medusa.exe File opened (read-only) \??\A: medusa.exe File opened (read-only) \??\O: medusa.exe File opened (read-only) \??\Q: medusa.exe File opened (read-only) \??\T: medusa.exe File opened (read-only) \??\P: medusa.exe File opened (read-only) \??\R: medusa.exe File opened (read-only) \??\S: medusa.exe File opened (read-only) \??\U: medusa.exe File opened (read-only) \??\B: medusa.exe File opened (read-only) \??\J: medusa.exe File opened (read-only) \??\L: medusa.exe File opened (read-only) \??\N: medusa.exe File opened (read-only) \??\H: medusa.exe File opened (read-only) \??\K: medusa.exe File opened (read-only) \??\V: medusa.exe File opened (read-only) \??\Z: medusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2768 vssadmin.exe 2256 vssadmin.exe 2800 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe 1392 medusa.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeBackupPrivilege 2720 vssvc.exe Token: SeRestorePrivilege 2720 vssvc.exe Token: SeAuditPrivilege 2720 vssvc.exe Token: SeIncreaseQuotaPrivilege 3028 wmic.exe Token: SeSecurityPrivilege 3028 wmic.exe Token: SeTakeOwnershipPrivilege 3028 wmic.exe Token: SeLoadDriverPrivilege 3028 wmic.exe Token: SeSystemProfilePrivilege 3028 wmic.exe Token: SeSystemtimePrivilege 3028 wmic.exe Token: SeProfSingleProcessPrivilege 3028 wmic.exe Token: SeIncBasePriorityPrivilege 3028 wmic.exe Token: SeCreatePagefilePrivilege 3028 wmic.exe Token: SeBackupPrivilege 3028 wmic.exe Token: SeRestorePrivilege 3028 wmic.exe Token: SeShutdownPrivilege 3028 wmic.exe Token: SeDebugPrivilege 3028 wmic.exe Token: SeSystemEnvironmentPrivilege 3028 wmic.exe Token: SeRemoteShutdownPrivilege 3028 wmic.exe Token: SeUndockPrivilege 3028 wmic.exe Token: SeManageVolumePrivilege 3028 wmic.exe Token: 33 3028 wmic.exe Token: 34 3028 wmic.exe Token: 35 3028 wmic.exe Token: SeIncreaseQuotaPrivilege 2604 wmic.exe Token: SeSecurityPrivilege 2604 wmic.exe Token: SeTakeOwnershipPrivilege 2604 wmic.exe Token: SeLoadDriverPrivilege 2604 wmic.exe Token: SeSystemProfilePrivilege 2604 wmic.exe Token: SeSystemtimePrivilege 2604 wmic.exe Token: SeProfSingleProcessPrivilege 2604 wmic.exe Token: SeIncBasePriorityPrivilege 2604 wmic.exe Token: SeCreatePagefilePrivilege 2604 wmic.exe Token: SeBackupPrivilege 2604 wmic.exe Token: SeRestorePrivilege 2604 wmic.exe Token: SeShutdownPrivilege 2604 wmic.exe Token: SeDebugPrivilege 2604 wmic.exe Token: SeSystemEnvironmentPrivilege 2604 wmic.exe Token: SeRemoteShutdownPrivilege 2604 wmic.exe Token: SeUndockPrivilege 2604 wmic.exe Token: SeManageVolumePrivilege 2604 wmic.exe Token: 33 2604 wmic.exe Token: 34 2604 wmic.exe Token: 35 2604 wmic.exe Token: SeIncreaseQuotaPrivilege 2572 wmic.exe Token: SeSecurityPrivilege 2572 wmic.exe Token: SeTakeOwnershipPrivilege 2572 wmic.exe Token: SeLoadDriverPrivilege 2572 wmic.exe Token: SeSystemProfilePrivilege 2572 wmic.exe Token: SeSystemtimePrivilege 2572 wmic.exe Token: SeProfSingleProcessPrivilege 2572 wmic.exe Token: SeIncBasePriorityPrivilege 2572 wmic.exe Token: SeCreatePagefilePrivilege 2572 wmic.exe Token: SeBackupPrivilege 2572 wmic.exe Token: SeRestorePrivilege 2572 wmic.exe Token: SeShutdownPrivilege 2572 wmic.exe Token: SeDebugPrivilege 2572 wmic.exe Token: SeSystemEnvironmentPrivilege 2572 wmic.exe Token: SeRemoteShutdownPrivilege 2572 wmic.exe Token: SeUndockPrivilege 2572 wmic.exe Token: SeManageVolumePrivilege 2572 wmic.exe Token: 33 2572 wmic.exe Token: 34 2572 wmic.exe Token: 35 2572 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2768 1392 medusa.exe 28 PID 1392 wrote to memory of 2768 1392 medusa.exe 28 PID 1392 wrote to memory of 2768 1392 medusa.exe 28 PID 1392 wrote to memory of 2768 1392 medusa.exe 28 PID 1392 wrote to memory of 3028 1392 medusa.exe 31 PID 1392 wrote to memory of 3028 1392 medusa.exe 31 PID 1392 wrote to memory of 3028 1392 medusa.exe 31 PID 1392 wrote to memory of 3028 1392 medusa.exe 31 PID 1392 wrote to memory of 2256 1392 medusa.exe 33 PID 1392 wrote to memory of 2256 1392 medusa.exe 33 PID 1392 wrote to memory of 2256 1392 medusa.exe 33 PID 1392 wrote to memory of 2256 1392 medusa.exe 33 PID 1392 wrote to memory of 2604 1392 medusa.exe 35 PID 1392 wrote to memory of 2604 1392 medusa.exe 35 PID 1392 wrote to memory of 2604 1392 medusa.exe 35 PID 1392 wrote to memory of 2604 1392 medusa.exe 35 PID 1392 wrote to memory of 2800 1392 medusa.exe 37 PID 1392 wrote to memory of 2800 1392 medusa.exe 37 PID 1392 wrote to memory of 2800 1392 medusa.exe 37 PID 1392 wrote to memory of 2800 1392 medusa.exe 37 PID 1392 wrote to memory of 2572 1392 medusa.exe 39 PID 1392 wrote to memory of 2572 1392 medusa.exe 39 PID 1392 wrote to memory of 2572 1392 medusa.exe 39 PID 1392 wrote to memory of 2572 1392 medusa.exe 39 PID 3024 wrote to memory of 1976 3024 taskeng.exe 46 PID 3024 wrote to memory of 1976 3024 taskeng.exe 46 PID 3024 wrote to memory of 1976 3024 taskeng.exe 46 PID 3024 wrote to memory of 1976 3024 taskeng.exe 46 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" medusa.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\medusa.exe"C:\Users\Admin\AppData\Local\Temp\medusa.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1392 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2768
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2256
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2800
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Windows\system32\taskeng.exetaskeng.exe {32841301-DBDA-46F8-A0E8-890FD270301E} S-1-5-21-2084844033-2744876406-2053742436-1000:GGPVHMXR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5f6f120d1262b88f79debb5d848ac7db9
SHA11339282f9b2d2a41326daf3cf284ec2ae8f0f93c
SHA2561bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
SHA5121067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
Filesize
235KB
MD5f6f120d1262b88f79debb5d848ac7db9
SHA11339282f9b2d2a41326daf3cf284ec2ae8f0f93c
SHA2561bc0575b3fc6486cb2510dac1ac6ae4889b94a955d3eade53d3ba3a92d133281
SHA5121067c1a73cf891d651fa007f4ccc4452f32801fe3859933ef1bcc00985e35ce016fa6c601c0e3c10df2080fc9b8a776b2f18d40bd64dfb98177ab638c4b545bd
-
Filesize
536B
MD57980c2a3045f8c15d729e31dbde2446b
SHA1f4a6c45c0cb637c7b9a33878ca26bf6c239539da
SHA256bc65c7c079b40b64a5994302ce40fc2598172307c2f44ebb39ce52dd83dbea1d
SHA5129d4c1780d514548e58f94a36684f8cf92b0adc2db2866e3df32d3c8e0975135216930c884c6e57a564a332edc5a710eddab323c3157c8adbdd9d0b6de7eee30f
-
Filesize
4KB
MD5cda5647b3e7d845925e1f9d60c101be1
SHA1a9a9f5581194c533d2260420b921ef3a3c6acde3
SHA256f19bcf6314627376b6846339f4b2b65755e98cafdeab010307a5d1b8125c31aa
SHA51266000537677b94bbc6d5d74f7e3c871d567828c1dbc8c81d2bc91d5387708ee37f26c9caa961ea824ed33a04810be7e4a9f76a9f4b572759f138719088d58034