General
-
Target
JaffaCakes118_45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea
-
Size
300KB
-
Sample
241222-grthtaxjhj
-
MD5
cb9b02262dd099c2be852f80b612d9df
-
SHA1
7023a0b5d68d80b1bae3cf17745b6d3a1a830bbb
-
SHA256
45c46ce6e6c549d90e06f1ab9722e01a075153dd6b667c0e716d37bf10fe05ea
-
SHA512
33c53c1b81645043e6d54ccc92569fa2b7585228bcda13432b599bbaf74879d141cee50a6cef31317918ff669cd220d5831e57fe60e3b9bc2508eef012efad7f
-
SSDEEP
6144:9sgET/FMKlMEuBZaxAs+NEUNIJ5hY9/6CCS5nIFVyc9pnlWV5KeQKQ/DYiTs26Ju:9sDFllMNZaxAs+L3GS5IFD9pn8vKeQKs
Behavioral task
behavioral1
Sample
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd
-
Size
669KB
-
MD5
f3f4909771e23ec301ae2a2c5945f25c
-
SHA1
0cbbc30d64966d7108f3404979058285d8ed250c
-
SHA256
46c9bed88ac58193eb8c1b2ca91cfede01a74dafa4315ff57b7d3bb0c8a779cd
-
SHA512
fd928762c0ddc8301092504874b0ff4ad81a65c4cd385a493db2a5dcce786bcb2f915869958a6618ba10ac443ac6af6a458fed5ec2aedc52e0c649d9d72c27ad
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DEKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWxKrKe
-
MedusaLocker payload
-
Medusalocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1