Analysis

  • max time kernel
    20s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 07:08

General

  • Target

    1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f.exe

  • Size

    669KB

  • MD5

    3618b68d7db4614ec8d33b5052cc0e85

  • SHA1

    15177fbb65d707b308bac50f612b795494314001

  • SHA256

    1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

  • SHA512

    d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d

  • SSDEEP

    12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DHKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWaKrKe

Malware Config

Extracted

Path

\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">F5281541590A23A07EF8310951D71302DC0A2FC849D80D0A22E9551146D0012E4DB9061A7355D680B5D10446AC7A0A27000B4401E71396EA3C58E94C54E73C63<br>C9D9DE9CBCD6A3ED7592D565ABE7AE21AF9D5A44BFD7C5430CBDD349CD782A9F62407D7A28C6DB95B47FAB8413964266403ABDE4C976B792B618C2BBE182<br>2C8C7323BB6A832437CA19283D36AF6DC4B6256F441D36B02842990AAB889301E63941647C5F1A711991B5B9DDE7289B13CAFF36078EDB856AD0F6DA18FE<br>76E5DFA85A463FB33021B86953E8BE33CF8BA0B8B8B4696348F58D5E5B55B53D219613B678924E9AEA9E806BE9569E7313A77474569699E1A5CD902EA9AE<br>92D1435F14869F923FF7B1717FD2353EB6DE97E9B6DF01F169EB0662EBAAAB99FEB13D7D5E270EA7D111B42DAA4F015DE2D0E27DD377DE4A91DEE9EB89D0<br>1950B1BE3ED92D875868DEA4FF0A55178443C818D9D063966439ACC909463287D9B9111DAFA62A96F16F3C0EC947B3B2FF7F8BCDB8832A89F91FB6A45107<br>E9D34D189F405E02C885B6D35F49DD6B8EEE197D0CC3D7801836CD2668A2DABD74E158E7B8C6A1583E24276C898FCA18CA6B21D3A5CB9B90278B6D01B629<br>5B36468FFDA5B57EEDC8BB40E680641BA24C809CC61F0A824B3D37B53DB415191757856FB8BE0351850CB6BDC3A752F8C43DD55DC7A06584EE7B29DA8F76<br>030F1443EB86770CA0C699D73428</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker payload 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Renames multiple (207) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2276
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4640
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4012
  • C:\Users\Admin\AppData\Roaming\svhost.exe
    C:\Users\Admin\AppData\Roaming\svhost.exe
    1⤵
      PID:3344

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\svhost.exe

      Filesize

      669KB

      MD5

      3618b68d7db4614ec8d33b5052cc0e85

      SHA1

      15177fbb65d707b308bac50f612b795494314001

      SHA256

      1658a064cb5a5681eee7ea82f92a2b7a14f70268dda3fc7aad8a610434711a8f

      SHA512

      d6ab35314f9388cafc340edc4476f374faddf6b0905d736356be32fc3e77cb2baa09fedc13af5a43c10fb4631cc77e766b530e58fa47f98329e9e2371cdd7e8d

    • C:\Users\Default\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000002.regtrans-ms

      Filesize

      92KB

      MD5

      486c374667dd7de0961ff0e195cb2f0c

      SHA1

      b56f2effab0c7eb1bec45da7b1fca24c33b075f9

      SHA256

      87b96fde79bda95fd404d3a8358b3a740d3457473820b45777db77912daf1b11

      SHA512

      d3a6aa912ee715f9935220ccb1b6d1a5a39641860a6c21b55b84a0d5cc48ba78ce8b1fe9316f93cf66aab6cb53ac6b8935c49edd76020f7e0d42843671fe32e7

    • C:\Users\Default\ntuser.dat.LOG2

      Filesize

      536B

      MD5

      49c027385824bdf648253ba0b222fdb1

      SHA1

      d43df9b6d393a458512f6e9fdeab1d109de2ef7c

      SHA256

      cb689592ebfdbc94a1dc21466898c2ee8895b059acd60f8c16d24cc29b342ea3

      SHA512

      7fa55c5ac2ddd49805b5d19abd5847ab9cb3dd0679973e0f831574616cf2899844aa2ef7b107aa42a2cdbd2416d658aeaf34deca676cf4cdbfcd15fe7f8136ef