Malware Analysis Report

2024-09-11 01:55

Sample ID 231231-ae97gadba8
Target 2120cf93b6be39884f951ee2a31c5999
SHA256 c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6
Tags
medusalocker evasion ransomware spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6

Threat Level: Known bad

The file 2120cf93b6be39884f951ee2a31c5999 was found to be: Known bad.

Malicious Activity Summary

medusalocker evasion ransomware spyware stealer trojan

Medusalocker family

UAC bypass

MedusaLocker payload

MedusaLocker

Renames multiple (333) files with added filename extension

Deletes shadow copies

Reads user/profile data of web browsers

Executes dropped EXE

Enumerates connected drives

Checks whether UAC is enabled

Drops desktop.ini file(s)

Unsigned PE

Enumerates physical storage devices

System policy modification

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Interacts with shadow copies

Uses Volume Shadow Copy service COM API

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2023-12-31 00:08

Signatures

MedusaLocker payload

Description Indicator Process Target
N/A N/A N/A N/A

Medusalocker family

medusalocker

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 00:08

Reported

2024-01-04 22:36

Platform

win7-20231215-en

Max time kernel

129s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"

Signatures

MedusaLocker

ransomware medusalocker

MedusaLocker payload

Description Indicator Process Target
N/A N/A N/A N/A

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Deletes shadow copies

ransomware

Renames multiple (333) files with added filename extension

ransomware

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svhost.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2432 wrote to memory of 616 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 616 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 616 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 616 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 1076 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2204 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\vssadmin.exe
PID 2432 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2432 wrote to memory of 2628 N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe C:\Windows\SysWOW64\Wbem\wmic.exe
PID 2596 wrote to memory of 2496 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\svhost.exe
PID 2596 wrote to memory of 2496 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\svhost.exe
PID 2596 wrote to memory of 2496 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\svhost.exe
PID 2596 wrote to memory of 2496 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\AppData\Roaming\svhost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe

"C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\system32\taskeng.exe

taskeng.exe {E310F6C0-3BF0-4262-9BEF-1A1C040A1C50} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]

C:\Users\Admin\AppData\Roaming\svhost.exe

C:\Users\Admin\AppData\Roaming\svhost.exe

Network

N/A

Files

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

MD5 c21e4a5be0ea5ffde78f872c39f720e2
SHA1 1d9209fd675bde427577ad28afb05c70455760e7
SHA256 8b39331bc152079f865c185d9f6aa6b1c5fee49e546d6cd56e4fe8f6cc1df567
SHA512 e2ef69f5f5edaab18befa46140007e9ca91a507dae3e0d9a46ce86c3acc55217a329bdbddab7a3c07d8db12ca777ef87b362b25bdc2b103f67d04d64cc3b69e6

C:\Users\Default\NTUSER.DAT.LOG2

MD5 3a4928d74ed244bfc2aad6c7cb49e3df
SHA1 da223b86785cc3df669c316ab60b50f489d94016
SHA256 181148c75aff9e7176dbd4ded971057280edabf251df728030dbb72362452be4
SHA512 afb94544d2acff879ffdf864ad4487792899712131b82a38739841573601e291c250ea1c7b661812ed1ffc5a6bf5279acc6c1911e6919c93085d9510225ee2df

C:\Users\Admin\AppData\Roaming\svhost.exe

MD5 2120cf93b6be39884f951ee2a31c5999
SHA1 317b695da0ece90979f0400c2c7800e50bec8bb9
SHA256 c5bef2a489740192a0b2c34cdc2fd954d0b8d5fabcbe0ecb8b78f9301e5a30a6
SHA512 3038b27dcc263675a642f77d9dbaaff921c3a56f160051df44619dbafcd5d108db1c6caeacb70179c511e284035d329f29c34dd19500d2bd4006d2f86ee1dc33

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 00:08

Reported

2024-01-04 22:37

Platform

win10v2004-20231222-en

Max time kernel

1s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"

Signatures

MedusaLocker

ransomware medusalocker

MedusaLocker payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-1168293393-3419776239-306423207-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\Wbem\wmic.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe

"C:\Users\Admin\AppData\Local\Temp\2120cf93b6be39884f951ee2a31c5999.exe"

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\SysWOW64\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Users\Admin\AppData\Roaming\svhost.exe

C:\Users\Admin\AppData\Roaming\svhost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 182.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 148.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 134.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 183.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 176.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 81.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 210.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
FR 20.199.58.43:443 tcp
FR 20.199.58.43:443 tcp
FR 20.199.58.43:443 tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

MD5 a1e8bb1c6b4e9016e7058279fb324b8f
SHA1 9f1f16755a0f0a73be07e4f000fc41e8ebc862d7
SHA256 ed5b5e37f0a95d8e348a4672d7807b2e7a47fa69ba2cc1dafb40987716aa91f4
SHA512 862050e79159bebd00e17439e8dda7ff2ec7876fef74e03119dfb655dbda7bc40907f40174a8aadf8255ee17a112a80163f74e806fbaeef253e3b4d6eb87a0c2

C:\Users\Default\ntuser.dat.LOG2

MD5 970efbc8c22efc6988079c40fb83239c
SHA1 817582fad58a43426061d914064e2d48dd48c01b
SHA256 f7ba1a8aac83b8e7dc790bd7f3377fd9de937f3217e4347639660a1af5c5e902
SHA512 5763b4f3a02914454a1f8a61bbba031c753a40a8c9055d217ebb753f10fb0988a7ef45b7930d907c19fabb5cd3a67032579ba4e3c935111a3158bde3c8f2bdb3

C:\Users\Default\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms

MD5 cd9e3ef4cc999ccf5e2d1f74f0fe7c2e
SHA1 c1ba28484f8ceca2d72bc1e59dd0d27ed8fb39dd
SHA256 19a7051ea375406e484094bcb50435d26259efed5afe64820ca104443f8d571c
SHA512 5d487e8a9e577c8adb74d6b8baacd76218ee72c535fbbb07aa799aba6efd9ba197de9348fc862527843114eff72b69a3191f77e52c708b83dab554f167c0f805

C:\Users\Admin\AppData\Roaming\svhost.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Roaming\svhost.exe

MD5 c89c7f4705acb628e00c56966b54f0af
SHA1 91584344b182ef6f8be2a11b9c3255207c717036
SHA256 cd8925980225ea79877b4549a7ef2cf8304596e9f1d6cdbfaa08ef8e3a3257f0
SHA512 906db0dc9225862039091addfb6c6355103840f97b295841fc88e0fe9b7f6111b636e5d36ef5ec43e31e3591fe49cfdc4136bc89b706d2f491333c43bfb7d2f4