Analysis
-
max time kernel
300s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 12:20
Behavioral task
behavioral1
Sample
medusa.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
medusa.exe
Resource
win10v2004-20241007-en
General
-
Target
medusa.exe
-
Size
669KB
-
MD5
646698572afbbf24f50ec5681feb2db7
-
SHA1
70530bc23bad38e6aee66cbb2c2f58a96a18fb79
-
SHA256
26af2222204fca27c0fdabf9eefbfdb638a8a9322b297119f85cce3c708090f0
-
SHA512
89bad552a3c0d8b28550957872561d03bf239d2708d616f21cbf22e58ae749542b07eee00fedac6fdb83c5969f50ea0f56fc103264a164671a94e156f73f160a
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8D4KD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWdKrKe
Malware Config
Extracted
\Device\HarddiskVolume1\how_to_back_files.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023bc6-770.dat family_medusalocker -
Medusalocker family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe -
Renames multiple (249) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 232 svhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-940901362-3608833189-1915618603-1000\desktop.ini medusa.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: medusa.exe File opened (read-only) \??\O: medusa.exe File opened (read-only) \??\W: medusa.exe File opened (read-only) \??\X: medusa.exe File opened (read-only) \??\Z: medusa.exe File opened (read-only) \??\A: medusa.exe File opened (read-only) \??\N: medusa.exe File opened (read-only) \??\R: medusa.exe File opened (read-only) \??\V: medusa.exe File opened (read-only) \??\F: medusa.exe File opened (read-only) \??\B: medusa.exe File opened (read-only) \??\J: medusa.exe File opened (read-only) \??\Y: medusa.exe File opened (read-only) \??\L: medusa.exe File opened (read-only) \??\P: medusa.exe File opened (read-only) \??\Q: medusa.exe File opened (read-only) \??\E: medusa.exe File opened (read-only) \??\G: medusa.exe File opened (read-only) \??\H: medusa.exe File opened (read-only) \??\I: medusa.exe File opened (read-only) \??\K: medusa.exe File opened (read-only) \??\S: medusa.exe File opened (read-only) \??\T: medusa.exe File opened (read-only) \??\U: medusa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language medusa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe 2276 medusa.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1620 wmic.exe Token: SeSecurityPrivilege 1620 wmic.exe Token: SeTakeOwnershipPrivilege 1620 wmic.exe Token: SeLoadDriverPrivilege 1620 wmic.exe Token: SeSystemProfilePrivilege 1620 wmic.exe Token: SeSystemtimePrivilege 1620 wmic.exe Token: SeProfSingleProcessPrivilege 1620 wmic.exe Token: SeIncBasePriorityPrivilege 1620 wmic.exe Token: SeCreatePagefilePrivilege 1620 wmic.exe Token: SeBackupPrivilege 1620 wmic.exe Token: SeRestorePrivilege 1620 wmic.exe Token: SeShutdownPrivilege 1620 wmic.exe Token: SeDebugPrivilege 1620 wmic.exe Token: SeSystemEnvironmentPrivilege 1620 wmic.exe Token: SeRemoteShutdownPrivilege 1620 wmic.exe Token: SeUndockPrivilege 1620 wmic.exe Token: SeManageVolumePrivilege 1620 wmic.exe Token: 33 1620 wmic.exe Token: 34 1620 wmic.exe Token: 35 1620 wmic.exe Token: 36 1620 wmic.exe Token: SeIncreaseQuotaPrivilege 2564 wmic.exe Token: SeSecurityPrivilege 2564 wmic.exe Token: SeTakeOwnershipPrivilege 2564 wmic.exe Token: SeLoadDriverPrivilege 2564 wmic.exe Token: SeSystemProfilePrivilege 2564 wmic.exe Token: SeSystemtimePrivilege 2564 wmic.exe Token: SeProfSingleProcessPrivilege 2564 wmic.exe Token: SeIncBasePriorityPrivilege 2564 wmic.exe Token: SeCreatePagefilePrivilege 2564 wmic.exe Token: SeBackupPrivilege 2564 wmic.exe Token: SeRestorePrivilege 2564 wmic.exe Token: SeShutdownPrivilege 2564 wmic.exe Token: SeDebugPrivilege 2564 wmic.exe Token: SeSystemEnvironmentPrivilege 2564 wmic.exe Token: SeRemoteShutdownPrivilege 2564 wmic.exe Token: SeUndockPrivilege 2564 wmic.exe Token: SeManageVolumePrivilege 2564 wmic.exe Token: 33 2564 wmic.exe Token: 34 2564 wmic.exe Token: 35 2564 wmic.exe Token: 36 2564 wmic.exe Token: SeIncreaseQuotaPrivilege 8 wmic.exe Token: SeSecurityPrivilege 8 wmic.exe Token: SeTakeOwnershipPrivilege 8 wmic.exe Token: SeLoadDriverPrivilege 8 wmic.exe Token: SeSystemProfilePrivilege 8 wmic.exe Token: SeSystemtimePrivilege 8 wmic.exe Token: SeProfSingleProcessPrivilege 8 wmic.exe Token: SeIncBasePriorityPrivilege 8 wmic.exe Token: SeCreatePagefilePrivilege 8 wmic.exe Token: SeBackupPrivilege 8 wmic.exe Token: SeRestorePrivilege 8 wmic.exe Token: SeShutdownPrivilege 8 wmic.exe Token: SeDebugPrivilege 8 wmic.exe Token: SeSystemEnvironmentPrivilege 8 wmic.exe Token: SeRemoteShutdownPrivilege 8 wmic.exe Token: SeUndockPrivilege 8 wmic.exe Token: SeManageVolumePrivilege 8 wmic.exe Token: 33 8 wmic.exe Token: 34 8 wmic.exe Token: 35 8 wmic.exe Token: 36 8 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1620 2276 medusa.exe 84 PID 2276 wrote to memory of 1620 2276 medusa.exe 84 PID 2276 wrote to memory of 1620 2276 medusa.exe 84 PID 2276 wrote to memory of 2564 2276 medusa.exe 88 PID 2276 wrote to memory of 2564 2276 medusa.exe 88 PID 2276 wrote to memory of 2564 2276 medusa.exe 88 PID 2276 wrote to memory of 8 2276 medusa.exe 90 PID 2276 wrote to memory of 8 2276 medusa.exe 90 PID 2276 wrote to memory of 8 2276 medusa.exe 90 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" medusa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" medusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\medusa.exe"C:\Users\Admin\AppData\Local\Temp\medusa.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2276 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD5646698572afbbf24f50ec5681feb2db7
SHA170530bc23bad38e6aee66cbb2c2f58a96a18fb79
SHA25626af2222204fca27c0fdabf9eefbfdb638a8a9322b297119f85cce3c708090f0
SHA51289bad552a3c0d8b28550957872561d03bf239d2708d616f21cbf22e58ae749542b07eee00fedac6fdb83c5969f50ea0f56fc103264a164671a94e156f73f160a
-
Filesize
536B
MD51146a6e490ce5cec3834cc9e544829b0
SHA10decab062fd239c9578f404e400379a7f594d2db
SHA256715768d6e7276e110a4a315d964dc4e43b30b02957907d1eeb48df0a130599d5
SHA512c55514ed1c44343317518dce0621bb57bc986dc40d5af4e3a3a5923c1702e9ec150c858a90e76846ca87d5a4cd7167f5a745806e6696569c9384daf895c9dc5a
-
Filesize
4KB
MD5a4608c5af58c19e35f0efaa4a2524f37
SHA11e518bcef6d388a61962831f8c7ffdc3e04de0a5
SHA256cb3dff8cf72cdc17ccf6f5c3d1f6d28c8639af1104aa69ff6dbffad0ecf07f46
SHA512de15022555e8910e63c43d85814d1a6493a26d43ca2feaeb92aca40f0ccc36a2ef410db9327544fdf7a183d1068030c05e99ecc47d20a0ca9bb5fc37656cf965