General
-
Target
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6
-
Size
5.6MB
-
Sample
240623-2sclxawdqa
-
MD5
095db264f03dba2cb16f1e3acaf60d27
-
SHA1
2b1bb5b5aedcc0dd95eb694ae53aa4ce108c85bb
-
SHA256
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6
-
SHA512
7706cdcb52fc5318ee6a14c9ba580980d7af4e851485de8662ac997359dbac140ad1cb8f31d9e71ee9574cb0307e4167c8a5e807cffabca6b093682f4d1232ea
-
SSDEEP
98304:uv9Vu+MMjYAMHlaWnAskRRZfhck06/o/Di+R1MI064hHgjhxCJpGdKeeO53LSNpw:uv988KlaOARRZfCxDbxRj6HgbCbvSLSh
Behavioral task
behavioral1
Sample
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\Recovery_Instructions.html
Extracted
\Device\HarddiskVolume1\Recovery_Instructions.html
Targets
-
-
Target
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6
-
Size
5.6MB
-
MD5
095db264f03dba2cb16f1e3acaf60d27
-
SHA1
2b1bb5b5aedcc0dd95eb694ae53aa4ce108c85bb
-
SHA256
706cf72e86b19918cda7b573f549fa286ba005615ddf9cb4acd01cf09a0d20a6
-
SHA512
7706cdcb52fc5318ee6a14c9ba580980d7af4e851485de8662ac997359dbac140ad1cb8f31d9e71ee9574cb0307e4167c8a5e807cffabca6b093682f4d1232ea
-
SSDEEP
98304:uv9Vu+MMjYAMHlaWnAskRRZfhck06/o/Di+R1MI064hHgjhxCJpGdKeeO53LSNpw:uv988KlaOARRZfCxDbxRj6HgbCbvSLSh
-
MedusaLocker payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
-
Detects command variations typically used by ransomware
-
Detects executables packed with VMProtect.
-
Renames multiple (199) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2