Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:08
Behavioral task
behavioral1
Sample
2120cf93b6be39884f951ee2a31c5999.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2120cf93b6be39884f951ee2a31c5999.exe
Resource
win10v2004-20231222-en
General
-
Target
2120cf93b6be39884f951ee2a31c5999.exe
-
Size
669KB
-
MD5
2120cf93b6be39884f951ee2a31c5999
-
SHA1
317b695da0ece90979f0400c2c7800e50bec8bb9
-
SHA256
c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6
-
SHA512
3038b27dcc263675a642f77d9dbaaff921c3a56f160051df44619dbafcd5d108db1c6caeacb70179c511e284035d329f29c34dd19500d2bd4006d2f86ee1dc33
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DKKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWjKrKe
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e630-693.dat family_medusalocker behavioral2/files/0x000400000001e630-692.dat family_medusalocker -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2120cf93b6be39884f951ee2a31c5999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 2120cf93b6be39884f951ee2a31c5999.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2120cf93b6be39884f951ee2a31c5999.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1168293393-3419776239-306423207-1000\desktop.ini 2120cf93b6be39884f951ee2a31c5999.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\U: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\E: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\H: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\L: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\O: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\R: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\B: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\K: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\Q: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\X: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\Z: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\I: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\N: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\W: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\F: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\S: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\V: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\Y: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\A: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\G: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\J: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\M: 2120cf93b6be39884f951ee2a31c5999.exe File opened (read-only) \??\P: 2120cf93b6be39884f951ee2a31c5999.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe 4504 2120cf93b6be39884f951ee2a31c5999.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3120 wmic.exe Token: SeSecurityPrivilege 3120 wmic.exe Token: SeTakeOwnershipPrivilege 3120 wmic.exe Token: SeLoadDriverPrivilege 3120 wmic.exe Token: SeSystemProfilePrivilege 3120 wmic.exe Token: SeSystemtimePrivilege 3120 wmic.exe Token: SeProfSingleProcessPrivilege 3120 wmic.exe Token: SeIncBasePriorityPrivilege 3120 wmic.exe Token: SeCreatePagefilePrivilege 3120 wmic.exe Token: SeBackupPrivilege 3120 wmic.exe Token: SeRestorePrivilege 3120 wmic.exe Token: SeShutdownPrivilege 3120 wmic.exe Token: SeDebugPrivilege 3120 wmic.exe Token: SeSystemEnvironmentPrivilege 3120 wmic.exe Token: SeRemoteShutdownPrivilege 3120 wmic.exe Token: SeUndockPrivilege 3120 wmic.exe Token: SeManageVolumePrivilege 3120 wmic.exe Token: 33 3120 wmic.exe Token: 34 3120 wmic.exe Token: 35 3120 wmic.exe Token: 36 3120 wmic.exe Token: SeIncreaseQuotaPrivilege 2644 wmic.exe Token: SeSecurityPrivilege 2644 wmic.exe Token: SeTakeOwnershipPrivilege 2644 wmic.exe Token: SeLoadDriverPrivilege 2644 wmic.exe Token: SeSystemProfilePrivilege 2644 wmic.exe Token: SeSystemtimePrivilege 2644 wmic.exe Token: SeProfSingleProcessPrivilege 2644 wmic.exe Token: SeIncBasePriorityPrivilege 2644 wmic.exe Token: SeCreatePagefilePrivilege 2644 wmic.exe Token: SeBackupPrivilege 2644 wmic.exe Token: SeRestorePrivilege 2644 wmic.exe Token: SeShutdownPrivilege 2644 wmic.exe Token: SeDebugPrivilege 2644 wmic.exe Token: SeSystemEnvironmentPrivilege 2644 wmic.exe Token: SeRemoteShutdownPrivilege 2644 wmic.exe Token: SeUndockPrivilege 2644 wmic.exe Token: SeManageVolumePrivilege 2644 wmic.exe Token: 33 2644 wmic.exe Token: 34 2644 wmic.exe Token: 35 2644 wmic.exe Token: 36 2644 wmic.exe Token: SeIncreaseQuotaPrivilege 1440 wmic.exe Token: SeSecurityPrivilege 1440 wmic.exe Token: SeTakeOwnershipPrivilege 1440 wmic.exe Token: SeLoadDriverPrivilege 1440 wmic.exe Token: SeSystemProfilePrivilege 1440 wmic.exe Token: SeSystemtimePrivilege 1440 wmic.exe Token: SeProfSingleProcessPrivilege 1440 wmic.exe Token: SeIncBasePriorityPrivilege 1440 wmic.exe Token: SeCreatePagefilePrivilege 1440 wmic.exe Token: SeBackupPrivilege 1440 wmic.exe Token: SeRestorePrivilege 1440 wmic.exe Token: SeShutdownPrivilege 1440 wmic.exe Token: SeDebugPrivilege 1440 wmic.exe Token: SeSystemEnvironmentPrivilege 1440 wmic.exe Token: SeRemoteShutdownPrivilege 1440 wmic.exe Token: SeUndockPrivilege 1440 wmic.exe Token: SeManageVolumePrivilege 1440 wmic.exe Token: 33 1440 wmic.exe Token: 34 1440 wmic.exe Token: 35 1440 wmic.exe Token: 36 1440 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4504 wrote to memory of 3120 4504 2120cf93b6be39884f951ee2a31c5999.exe 21 PID 4504 wrote to memory of 3120 4504 2120cf93b6be39884f951ee2a31c5999.exe 21 PID 4504 wrote to memory of 3120 4504 2120cf93b6be39884f951ee2a31c5999.exe 21 PID 4504 wrote to memory of 2644 4504 2120cf93b6be39884f951ee2a31c5999.exe 27 PID 4504 wrote to memory of 2644 4504 2120cf93b6be39884f951ee2a31c5999.exe 27 PID 4504 wrote to memory of 2644 4504 2120cf93b6be39884f951ee2a31c5999.exe 27 PID 4504 wrote to memory of 1440 4504 2120cf93b6be39884f951ee2a31c5999.exe 26 PID 4504 wrote to memory of 1440 4504 2120cf93b6be39884f951ee2a31c5999.exe 26 PID 4504 wrote to memory of 1440 4504 2120cf93b6be39884f951ee2a31c5999.exe 26 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 2120cf93b6be39884f951ee2a31c5999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 2120cf93b6be39884f951ee2a31c5999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2120cf93b6be39884f951ee2a31c5999.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4504 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c89c7f4705acb628e00c56966b54f0af
SHA191584344b182ef6f8be2a11b9c3255207c717036
SHA256cd8925980225ea79877b4549a7ef2cf8304596e9f1d6cdbfaa08ef8e3a3257f0
SHA512906db0dc9225862039091addfb6c6355103840f97b295841fc88e0fe9b7f6111b636e5d36ef5ec43e31e3591fe49cfdc4136bc89b706d2f491333c43bfb7d2f4
-
C:\Users\Default\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms
Filesize512KB
MD5cd9e3ef4cc999ccf5e2d1f74f0fe7c2e
SHA1c1ba28484f8ceca2d72bc1e59dd0d27ed8fb39dd
SHA25619a7051ea375406e484094bcb50435d26259efed5afe64820ca104443f8d571c
SHA5125d487e8a9e577c8adb74d6b8baacd76218ee72c535fbbb07aa799aba6efd9ba197de9348fc862527843114eff72b69a3191f77e52c708b83dab554f167c0f805
-
Filesize
536B
MD5970efbc8c22efc6988079c40fb83239c
SHA1817582fad58a43426061d914064e2d48dd48c01b
SHA256f7ba1a8aac83b8e7dc790bd7f3377fd9de937f3217e4347639660a1af5c5e902
SHA5125763b4f3a02914454a1f8a61bbba031c753a40a8c9055d217ebb753f10fb0988a7ef45b7930d907c19fabb5cd3a67032579ba4e3c935111a3158bde3c8f2bdb3
-
Filesize
5KB
MD5a1e8bb1c6b4e9016e7058279fb324b8f
SHA19f1f16755a0f0a73be07e4f000fc41e8ebc862d7
SHA256ed5b5e37f0a95d8e348a4672d7807b2e7a47fa69ba2cc1dafb40987716aa91f4
SHA512862050e79159bebd00e17439e8dda7ff2ec7876fef74e03119dfb655dbda7bc40907f40174a8aadf8255ee17a112a80163f74e806fbaeef253e3b4d6eb87a0c2