Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 18:57
Behavioral task
behavioral1
Sample
medusa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
medusa.exe
Resource
win10v2004-20240226-en
General
-
Target
medusa.exe
-
Size
669KB
-
MD5
646698572afbbf24f50ec5681feb2db7
-
SHA1
70530bc23bad38e6aee66cbb2c2f58a96a18fb79
-
SHA256
26af2222204fca27c0fdabf9eefbfdb638a8a9322b297119f85cce3c708090f0
-
SHA512
89bad552a3c0d8b28550957872561d03bf239d2708d616f21cbf22e58ae749542b07eee00fedac6fdb83c5969f50ea0f56fc103264a164671a94e156f73f160a
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8D4KD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWdKrKe
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\how_to_back_files.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\svhost.exe family_medusalocker -
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe -
Renames multiple (233) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
Processes:
svhost.exepid process 940 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
medusa.exedescription ioc process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-983155329-280873152-1838004294-1000\desktop.ini medusa.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
medusa.exedescription ioc process File opened (read-only) \??\E: medusa.exe File opened (read-only) \??\M: medusa.exe File opened (read-only) \??\N: medusa.exe File opened (read-only) \??\S: medusa.exe File opened (read-only) \??\G: medusa.exe File opened (read-only) \??\J: medusa.exe File opened (read-only) \??\L: medusa.exe File opened (read-only) \??\Q: medusa.exe File opened (read-only) \??\U: medusa.exe File opened (read-only) \??\K: medusa.exe File opened (read-only) \??\R: medusa.exe File opened (read-only) \??\T: medusa.exe File opened (read-only) \??\W: medusa.exe File opened (read-only) \??\A: medusa.exe File opened (read-only) \??\B: medusa.exe File opened (read-only) \??\H: medusa.exe File opened (read-only) \??\I: medusa.exe File opened (read-only) \??\O: medusa.exe File opened (read-only) \??\P: medusa.exe File opened (read-only) \??\V: medusa.exe File opened (read-only) \??\X: medusa.exe File opened (read-only) \??\Y: medusa.exe File opened (read-only) \??\Z: medusa.exe File opened (read-only) \??\F: medusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
medusa.exepid process 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe 1684 medusa.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
wmic.exewmic.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 2132 wmic.exe Token: SeSecurityPrivilege 2132 wmic.exe Token: SeTakeOwnershipPrivilege 2132 wmic.exe Token: SeLoadDriverPrivilege 2132 wmic.exe Token: SeSystemProfilePrivilege 2132 wmic.exe Token: SeSystemtimePrivilege 2132 wmic.exe Token: SeProfSingleProcessPrivilege 2132 wmic.exe Token: SeIncBasePriorityPrivilege 2132 wmic.exe Token: SeCreatePagefilePrivilege 2132 wmic.exe Token: SeBackupPrivilege 2132 wmic.exe Token: SeRestorePrivilege 2132 wmic.exe Token: SeShutdownPrivilege 2132 wmic.exe Token: SeDebugPrivilege 2132 wmic.exe Token: SeSystemEnvironmentPrivilege 2132 wmic.exe Token: SeRemoteShutdownPrivilege 2132 wmic.exe Token: SeUndockPrivilege 2132 wmic.exe Token: SeManageVolumePrivilege 2132 wmic.exe Token: 33 2132 wmic.exe Token: 34 2132 wmic.exe Token: 35 2132 wmic.exe Token: 36 2132 wmic.exe Token: SeIncreaseQuotaPrivilege 3852 wmic.exe Token: SeSecurityPrivilege 3852 wmic.exe Token: SeTakeOwnershipPrivilege 3852 wmic.exe Token: SeLoadDriverPrivilege 3852 wmic.exe Token: SeSystemProfilePrivilege 3852 wmic.exe Token: SeSystemtimePrivilege 3852 wmic.exe Token: SeProfSingleProcessPrivilege 3852 wmic.exe Token: SeIncBasePriorityPrivilege 3852 wmic.exe Token: SeCreatePagefilePrivilege 3852 wmic.exe Token: SeBackupPrivilege 3852 wmic.exe Token: SeRestorePrivilege 3852 wmic.exe Token: SeShutdownPrivilege 3852 wmic.exe Token: SeDebugPrivilege 3852 wmic.exe Token: SeSystemEnvironmentPrivilege 3852 wmic.exe Token: SeRemoteShutdownPrivilege 3852 wmic.exe Token: SeUndockPrivilege 3852 wmic.exe Token: SeManageVolumePrivilege 3852 wmic.exe Token: 33 3852 wmic.exe Token: 34 3852 wmic.exe Token: 35 3852 wmic.exe Token: 36 3852 wmic.exe Token: SeIncreaseQuotaPrivilege 32 wmic.exe Token: SeSecurityPrivilege 32 wmic.exe Token: SeTakeOwnershipPrivilege 32 wmic.exe Token: SeLoadDriverPrivilege 32 wmic.exe Token: SeSystemProfilePrivilege 32 wmic.exe Token: SeSystemtimePrivilege 32 wmic.exe Token: SeProfSingleProcessPrivilege 32 wmic.exe Token: SeIncBasePriorityPrivilege 32 wmic.exe Token: SeCreatePagefilePrivilege 32 wmic.exe Token: SeBackupPrivilege 32 wmic.exe Token: SeRestorePrivilege 32 wmic.exe Token: SeShutdownPrivilege 32 wmic.exe Token: SeDebugPrivilege 32 wmic.exe Token: SeSystemEnvironmentPrivilege 32 wmic.exe Token: SeRemoteShutdownPrivilege 32 wmic.exe Token: SeUndockPrivilege 32 wmic.exe Token: SeManageVolumePrivilege 32 wmic.exe Token: 33 32 wmic.exe Token: 34 32 wmic.exe Token: 35 32 wmic.exe Token: 36 32 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
medusa.exedescription pid process target process PID 1684 wrote to memory of 2132 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 2132 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 2132 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 3852 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 3852 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 3852 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 32 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 32 1684 medusa.exe wmic.exe PID 1684 wrote to memory of 32 1684 medusa.exe wmic.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
medusa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" medusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\medusa.exe"C:\Users\Admin\AppData\Local\Temp\medusa.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1684 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe1⤵
- Executes dropped EXE
PID:940
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD5646698572afbbf24f50ec5681feb2db7
SHA170530bc23bad38e6aee66cbb2c2f58a96a18fb79
SHA25626af2222204fca27c0fdabf9eefbfdb638a8a9322b297119f85cce3c708090f0
SHA51289bad552a3c0d8b28550957872561d03bf239d2708d616f21cbf22e58ae749542b07eee00fedac6fdb83c5969f50ea0f56fc103264a164671a94e156f73f160a
-
Filesize
536B
MD56658f4baeaf85ed5344b282d043d41a1
SHA1f75d627a1b8931f5755ba46bf3692063341413a6
SHA256591dcb0e662cc217b3a43b54806ac0233b78e235b3473103578bd47629f569be
SHA512f9725a1d1d5d9f538046953f7099c63a3cf11b830d534e27e0b45ee2aa66ec6cdc29d28d8a142bb24347dc4294b5639372586f92e1cc011781f2affd561741eb
-
Filesize
4KB
MD57cbf795936b36f7abbe170922f710341
SHA195e248270b7dc9948902ade42198f4c03b29e5ad
SHA256200cbe3a3903f0e108f29e30a20f1abe151399a11654f9d4a959a770d37e479b
SHA51260ceeadfbb7a45a892034b09d60733da11eee1ddd20addac94ccc123fb98b125590b46b38b819329ab42b583bb2bc789bb117e27adf2ba1d337aa20d13c46a2e