See Cynet’s Autonomous
Breach Protection in Action

Prefer a one-on-one demo? Click here

By clicking next I consent to the use of my personal data by Cynet in accordance with Cynet's Privacy Policy and by its partners


Brought to you by Cynet's CyOps Center

Cynet's 24/7 MDR with the latest security updates and reports

Learn more about CyOps

Network Attacks and Exfiltration

Credential Access & Data Collection

Initial Access and Fileless Attacks

Ransomware Threat Reports

Threat Reports



Evasion techniques

Ransomware Attacks in Belgium – Analysis & Protection

Written by: Max Malyutin, Haim Nahmani, and Itamar Meydoni

There are reports lately on a wave of ransomware attacks targeting organizations in Belgium. While the damage this wave inflicts is substantial, the ransomware itself has not been publicly associated with any known malware families or attack groups. The Cynet research team has conducted a thorough analysis of various samples from these attacks and concluded that there is strong resemblance to both GlobeImposter and MedusaLocker ransomware attacks. The full analysis is available below. 

Cynet 360 identifies the ransomware used in these attacks with various detection logics and prevents its execution. Blocking this ransomware involves the following mechanisms: 

Cynet’s multilayer protection is able to granularly identify various different malicious particles in the overall process execution, providing airtight protection against these types of attacks.

Ransomware Analysis and Conclusions


The attacker uses a PowerShell script file, which was distributed to all the systems that were encrypted.

The PowerShell Script is a known PowerSploit Module called Invoke – reflective PE Injection which can be found here:

The PowerShell script, when run, compiles an independent 32-bit instance of PowerShell, calls it “svhost.exe” and locates it in Appdata\Roaming directory:

The PowerShell script follows to create a scheduled task to run each 15 minutes and attempt to remove all backup shadows from VSSADMIN using the SVHOST.exe that was created earlier. The SVHOST.exe executes the following command that responsible for deleting all backups: “vssadmin.exe Delete Shadows /All /Quiet”

The SVHOST.exe is running by the process DLLhost.exe which runs with the following command to bypass the need for User Access Control when doing so:

C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}

This method is a known as CMSTP:

By extracting the Base64 Encoded Ransom payload from the initial PowerShell script (DMX_CnC.tmp), we were able to create an executable version of the ransomware:

By reading all the strings in the file line by line we were able to locate a certain string which we suspected to be an unchanging string among various variants of the ransom.

When analyzing the encrypted files’ extension, the encryption method and the ransomware note, we can conclude that the said ransomware has indicators that are associated with two qwll known malware families:

  1. GlobeImposter Ransomware – Cynet researchers have identified unique memory strings that are linked to Globelmposter ransomware.
  2. MedusaLocker – when investigating the ransom note file,  it was noted that the ransom note file is highly similar to previous notes used by the initiators of MedusaLocker.


Scheduled tasksvhost