Analysis

  • max time kernel
    146s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 06:34

General

  • Target

    0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da.exe

  • Size

    2.5MB

  • MD5

    e63e41e15e86489a98dbeb2e6cb44e8a

  • SHA1

    5815d349a375f5cdf090ababcff86b3946ed6c07

  • SHA256

    0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da

  • SHA512

    749d9580ac631916fbc1db207f0f48ed2ff9979f0cd8e352633cd86edfe7bd5bbb6da90b014e0b8ad639f8b9e567498f07353ef907ce2bd6dfa5536d3079991e

  • SSDEEP

    49152:p+9pcEvA81ugLUKnGkFfHTvdlhylPdVkdL6rMD0uVVePR2EW:ktLUm3FfzvojKdLCAoPR2V

Malware Config

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker payload 8 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (618) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops file in Drivers directory 12 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 39 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 52 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da.exe
    "C:\Users\Admin\AppData\Local\Temp\0dd34e1326f18ab113be5ec91003577845f62ce25bbed8f92bff0b4077fe45da.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:716
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
      2⤵
      • Interacts with shadow copies
      PID:2004
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:4140
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:400
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3748
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3824
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2612
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3180
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3056
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4624
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4620
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3964
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3728
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:3048
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} recoveryenabled No
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:4148
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:5112
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:1960
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:4028
    • C:\Windows\System32\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4492
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0DD34E~1.EXE >> NUL
      2⤵
        PID:4604
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1368
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
      1⤵
      • Drops file in System32 directory
      PID:1116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.ReadInstructions

      Filesize

      814B

      MD5

      0e485735271fe8f7d671786f8173a3fc

      SHA1

      2e3f6ab9758f30f115945a6f1b665bd2540e579a

      SHA256

      6af6f3ff19c3d3e980ad692fc18ea288d8c0c8c842a580313e3c133787af9869

      SHA512

      200fb6fc1e0ded2e52d7ce80721e327ed16ea6ac7efe883f3fbf7ae5002b6f5ac7884c18fba897007bf60024d074c6b70907b0d75f332254a3b66c2a8dcf4c81

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions

      Filesize

      842B

      MD5

      7c45c8cda62383efd53a8c6a5df44249

      SHA1

      2870a6ab149bb875f06624b84f4dfbeb927919cf

      SHA256

      0c6e3c5e2e50109866ed0577e2a4fe385b9c02489d2a9114aeb2ade5cab6b5c2

      SHA512

      09ddd026e355da4c724aa64e37aa5d4dbc0b4d4d41b45ecc84bbd947f6a0313d64903f6e0e4035a9b1bef9377c3267711da727187623d761ed2a02213a622f6f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F.ReadInstructions

      Filesize

      700B

      MD5

      a4f129d6d555dc8e1255e059e197b3f4

      SHA1

      97dd1a242cf235818fb8046df7ec3813c9007551

      SHA256

      d16181ae005e8c6c958df63fef8c06c85ea4c37d6bd1ea47e46f4615c87e7c95

      SHA512

      1a03010436fa98d9ae643847390c9ba0f9074af51801b64c13c17fdd0aa8988b67d7104f3bdee14577089c041192525c68558c3f3df40a1c2f37a6e7e75d2258

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7.ReadInstructions

      Filesize

      770B

      MD5

      7105b279032119e3be20f4ca3b37c2ec

      SHA1

      6896627fcc813e4fdb4b819d4735b36398a766f6

      SHA256

      9c25cfe5af8556ef4fd6ca696507896cd2f31eeea6fb8a9bc6feddd84720708d

      SHA512

      d4c17bf9ff9d9cec9eda833ff8bb020c81499dcae93cf36910b2f2849ccf4741e6ed0ce5cb940ed2e50ba27798e2545ef9164fc7068ddbdfc5a215e34cf23c16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.ReadInstructions

      Filesize

      842B

      MD5

      2c5a0a39a49601f70c30ff67b7c2e187

      SHA1

      61d68a719a93b6713d80fa30f0734ad1c446b3ed

      SHA256

      593164629be571503a82c0d97a945651d2be5ad3329b48fc60dbd83bfb8c8a42

      SHA512

      6efd34137223ba07153e7266a72d2650c705a2581fd7db69d82a5f92a7b68d28d72728c70fefa3d1068b2ed998f2eebf838ac651fc381e9d229d81a49ed46da2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB5E2F83CE9B8330B0590B7CD2E5FF2E.ReadInstructions

      Filesize

      782B

      MD5

      2dc1884465ad83e45ad78b22c5bd2aab

      SHA1

      30024b7e75ca5293343feffe89e96bf2a876c616

      SHA256

      485662eee0655b40632a4269f6e54fa0217ec4b034c79888a2e2232d70cc0c17

      SHA512

      f7cc40ce5b958d54a9d7e74af897185bea4a3387bf2b0781e4327f29a997752182f5fa1c15b8d916a040cbdcc837dec979c4ad9c625f6c03dc88a9321c003f46

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      22KB

      MD5

      66e443a84a690c9f74523543de25e55c

      SHA1

      c8816b701429dede131a482c400c7c947ea96aae

      SHA256

      d63284321aa2a9597412743d03c1cdb35e88c01a15cde5f5b64e6715120f4eac

      SHA512

      fcd033ade951b1b7fd3b406108d7a29f22eb7cfbe1877a268ed05c0dda3fb6a1c52cc601c0f9a39dc82107f27285f6f3617574cc36e0d138b3a8b8ba341f0589

    • C:\Windows\System32\catroot2\edb.log

      Filesize

      2.0MB

      MD5

      50c6fcd5932e09901c15e9245407b49a

      SHA1

      825397fe99871f3ebffb9488f63a074fd0443bb6

      SHA256

      1669a5a15fd17d5b14d2935828a069e394f0577e93e28161450f72db654233ca

      SHA512

      b181e7f956e4799769687aa2b0aaf2b78be4475571d5c95807d029455a52f771784314a9c8311bdb6c6605d7a0c13795b4c80d50b4032d9cec896186255096d0

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

      Filesize

      290B

      MD5

      aaca93b53104d66b6049f6b14d70a91e

      SHA1

      b3e771c12f821a24605f2af14dbecd6d6ce4b58b

      SHA256

      7bb9267382d7034cdbcdd6bfdd690bd3249511754a6e89dc07e31d78a640e71a

      SHA512

      122de909d2deb94d976141b1a50f75aa6450dc395b1ac6460542ab19b2efd03d2c4c8a1e06630a6f12a7959d82e88ca0304d552a802728a320110374330f18e2

    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.ReadInstructions

      Filesize

      814B

      MD5

      4fbf9ffa915f43a8c710286bac6a0c10

      SHA1

      a90043d07490ca276f9156006ea981470677c69b

      SHA256

      30ba91769872bf7446a6a57819235a3cbdb9b521ce3af8b4e963eb94136cc43d

      SHA512

      b239bca574a290176577ed2803cd7cc3855138eca17718c4a9367da80a7e9c134cacc86baf528739f6c22b630c8ec62d045739433cb21f2bef270c13865075b6

    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.ReadInstructions

      Filesize

      802B

      MD5

      7d2168290aa9b2c6bd53b8c4576fc45a

      SHA1

      5f1bf6a5de742d425c30eeed9d526915d025f949

      SHA256

      4427c635602ff6929c1e14b8b8d6869deff5338a05a675f0319e86de067431f7

      SHA512

      84a7e3d37121b423fc68fe1dd08acf8f26d7be81fcdffe259d7f34e886d690366675fb5dc3eff439c3a88238c074ee0c1927330460afbc7116bc17f928924ef8

    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.ReadInstructions

      Filesize

      842B

      MD5

      bd4f70ac0f70fb5c5876eac7eaa47491

      SHA1

      ec223c46eb23db38e0aea4cfd9bd380615db2d49

      SHA256

      4f76efd7604ebe9c4466e18e40fa38cafd611a6659b10bd26d9f4ffc141d0eae

      SHA512

      2721d6c6382737f11455a8c7643cc68a183fbf36c628894476e8ae07236aa9f1f88086a5bcb51c2656e633e0e7fdb2bd900edc99c4f3e65e8c79452dc1f2be68

    • memory/716-7-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-1576-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-693-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-8-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-5-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-6-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-2-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-4-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-3-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/716-1-0x00007FFCFA150000-0x00007FFCFA152000-memory.dmp

      Filesize

      8KB

    • memory/716-0-0x00007FF7EEBA0000-0x00007FF7EF3E1000-memory.dmp

      Filesize

      8.3MB

    • memory/1116-1643-0x000001889C630000-0x000001889C631000-memory.dmp

      Filesize

      4KB

    • memory/1116-1664-0x000001889BB70000-0x000001889BB71000-memory.dmp

      Filesize

      4KB

    • memory/1116-1642-0x000001889B920000-0x000001889B921000-memory.dmp

      Filesize

      4KB

    • memory/1116-1638-0x000001889B7D0000-0x000001889B7D1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1645-0x000001889B830000-0x000001889B831000-memory.dmp

      Filesize

      4KB

    • memory/1116-1644-0x000001889B830000-0x000001889B831000-memory.dmp

      Filesize

      4KB

    • memory/1116-1647-0x000001889D4D0000-0x000001889D4D1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1648-0x000001889E030000-0x000001889E031000-memory.dmp

      Filesize

      4KB

    • memory/1116-1649-0x000001889E030000-0x000001889E031000-memory.dmp

      Filesize

      4KB

    • memory/1116-1651-0x000001889E300000-0x000001889E301000-memory.dmp

      Filesize

      4KB

    • memory/1116-1658-0x000001889F2F0000-0x000001889F2F1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1659-0x000001889F5F0000-0x000001889F5F1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1660-0x000001889F5F0000-0x000001889F5F1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1662-0x00000188A0290000-0x00000188A0291000-memory.dmp

      Filesize

      4KB

    • memory/1116-1663-0x000001889BB70000-0x000001889BB71000-memory.dmp

      Filesize

      4KB

    • memory/1116-1639-0x000001889B7F0000-0x000001889B7F1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1666-0x00000188A1380000-0x00000188A1381000-memory.dmp

      Filesize

      4KB

    • memory/1116-1667-0x000001889BEA0000-0x000001889BEA1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1668-0x000001889BEA0000-0x000001889BEA1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1670-0x00000188A23A0000-0x00000188A23A1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1637-0x000001889B6A0000-0x000001889B6A1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1635-0x000001889B6A0000-0x000001889B6A1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1632-0x000001889B5C0000-0x000001889B5C1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1631-0x000001889B5A0000-0x000001889B5A1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1630-0x000001889B460000-0x000001889B461000-memory.dmp

      Filesize

      4KB

    • memory/1116-1628-0x000001889B460000-0x000001889B461000-memory.dmp

      Filesize

      4KB

    • memory/1116-1606-0x000001889B090000-0x000001889B091000-memory.dmp

      Filesize

      4KB

    • memory/1116-1598-0x000001889B3C0000-0x000001889B3C1000-memory.dmp

      Filesize

      4KB

    • memory/1116-1589-0x0000018896FA0000-0x0000018896FB0000-memory.dmp

      Filesize

      64KB

    • memory/1116-1583-0x0000018896F40000-0x0000018896F50000-memory.dmp

      Filesize

      64KB