How ANY.RUN Helps Healthcare Organizations Against Ransomware: Interlock Case Study

How ANY.RUN Helps Healthcare Organizations Against Ransomware: Interlock Case Study

Ransomware attacks have become a relentless threat to the healthcare sector, exposing sensitive patient data, disrupting life-saving treatments, and placing lives at risk. With healthcare systems underfunded and critical infrastructure vulnerable, cybercriminals find this sector an easy and lucrative target. 

In recent years, ransomware attacks have not only caused financial losses but have also shaken public trust in healthcare organizations. Hospitals, medical service providers, and even blood donation centers have been hit, leaving a trail of chaos. 

This article highlights how healthcare organizations can benefit from ANY.RUN‘s Interactive Sandbox and Threat Intelligence Lookup to identify, investigate, and analyze ransomware attacks, using a real-world case study of the Interlock ransomware group. 

The Impact of Ransomware on Healthcare 

Before we dive deeper into how ANY.RUN helps counter such threats, let’s examine how devastating ransomware attacks can be across the healthcare sector. 

UnitedHealth  190 million records stolen in the largest healthcare breach 
Ascension  5.6 million patients affected in a Black Basta ransomware attack. 
Kootenai Health  464,000 patient records leaked. 
ConnectOnCall  Exposed the health data of over 910,000 patients in a breach of its SaaS system. 
Medusind  A December 2023 breach impacted 360,000 individuals, exposing sensitive billing and health information. 
Anna Jaques Hospital  Ransomware exposed sensitive health data for over 316,000 patients, disrupting critical medical services. 

What’s at stake? 

  • Loss of patient trust: Exposed personal and health information undermines confidence in healthcare providers. 
  • Operational disruption: Hospitals and medical facilities are forced to halt services, delaying critical treatments. 
  • Financial strain: Organizations face ransom demands, legal fees, and recovery costs, compounding the impact. 

Why Healthcare Is a Prime Target 

  1. Sensitive data: Patient records are incredibly valuable on the black market. Ransomware groups exploit this by encrypting data and demanding payments for decryption. 
  1. Critical infrastructure: Many healthcare systems cannot afford prolonged downtime due to their role in patient care. 
  1. Underfunded cybersecurity: Many healthcare providers operate on tight budgets, often prioritizing patient services over robust IT defenses. 
  1. Slow detection: A common issue is the inability to identify and respond to attacks in their early stages, which allows ransomware to spread undetected. 

Interlock Group: Active Ransomware Threat to Healthcare 

Interlock is a ransomware actor that engages in double-extortion. 

In late 2024, the Interlock ransomware group launched targeted attacks against multiple healthcare facilities in the United States, causing significant disruptions and exposing sensitive patient data: 

  • Brockton Neighborhood Health Center: Breached on October 20, 2024, undetected until December 17, 2024. 
  • Legacy Treatment Services: Attack detected on October 26, 2024. 
  • Drug and Alcohol Treatment Service: Breach discovered on October 24, 2024. 

How ANY.RUN Helps at Different Stages of Interlock Attacks

ANY.RUN provides healthcare organizations with proactive tools to analyze and investigate ransomware attacks at various stages. 

Let’s discover how by having a look at the Interlock ransomware group. The stages of the attack are taken from one of the most detailed reports on the threat from Talos, released on January 14, 2025. 

1. Initial Compromise (TA0001) 

At this stage, the Interlock ransomware group uses the Drive-by Compromise technique to gain access to the victim’s infrastructure. 

Drive-by Compromise: How It Happened 

The Interlock ransomware group either compromised or newly registered a phishing website, as evidenced by recent registration data in Whois. This phishing site was designed to appear as a news feed, complete with links for downloading software. Unwary users visiting the site were tricked into downloading malicious files. 

Here is how ANY.RUN’s Threat Intelligence Lookup could be used by analysts at this stage of the attack. 

Early Detection of Malicious Domains 

By querying the domain apple-online.shop, ANY.RUN found that users first flagged and analyzed the website on September 6, 2024, almost a month before public mentions of the group appeared in this report.

TI Lookup provides dozens of sandbox reports featuring the queried malicious domain

This means ANY.RUN detected suspicious activity nearly two months before the Talos report was published. 

Thanks to ANY.RUN’s access to public samples of the latest cyber threats from around the world, users of TI Lookup were able to identify Interlock’s domain as malicious before public reports. With such early detection, healthcare organizations can take preventative measures long before public alerts are raised. 

Collect threat intelligence with TI Lookup to improve your company’s security 



Get 50 free requests


Understanding Website Content 

With the help of ANY.RUN’s Interactive Sandbox, you can view how the malicious website looked like and what content was used to deceive users. By analyzing such sites, healthcare organizations can train employees to recognize and avoid similar threats in the future. 

View analysis session 

The malicious website used by Interlock displayed in ANY.RUN’s sandbox

The virtual machine allows anyone to see the behavior of this threat and interact with it in real time. 

Expanding on Known Threat Information 

ANY.RUN’s data can also enrich users’ existing knowledge of the attack.  

While reports stated that the attackers used malware disguised as a Google Chrome updater, ANY.RUN uncovered additional tactics, such as mimicking MSTeams and MicrosoftEdge updates (evident in filenames like MSTeamsSetup.exe and MicrosoftEdgeSetup.exe). 

ANY.RUN reports with analysis of Interlock’s fake updater programs

This shows that by identifying alternative disguises used for malware, ANY.RUN equips organizations to anticipate a broader range of file disguises utilized by Interlock. 

IOCs and File Analysis 

Reports mentioned a specific file named upd_2327991.exe used in the attack. ANY.RUN’s database reveals additional files with similar naming conventions, such as: 

Search with ANY.RUN’s TI Lookup reveals additional file names used by Interlock

This suggests that the attackers generated file names using random alphanumeric patterns. Each file had distinct hash values (SHA256), which serve as unique Indicators of Compromise (IOCs): 

  • 8d911ef72bdb4ec5b99b7548c0c89ffc8639068834a5e2b684c9d78504550927 
  • 97105ed172e5202bc219d99980ebbd01c3dfd7cd5f5ac29ca96c5a09caa8af67 

The analysis showed that with the help of ANY.RUN’s TI Lookup and Interactive Sandbox, healthcare organizations facing Interlock ransomware attacks could: 

Integrate proactive threat analysis with ANY.RUN
to strengthen your company’s security 



Get 14-day free trial


  • Discover the Start Date of Attacks: Get information about the first activities of the attacking group, which often happen before public reports.  
  • Study the Attacker’s Setup: Identify the domains, IP addresses, and other parts of the attacker’s setup to learn more about their tactics and methods.  
  • Improve Detection Systems: Collect additional IOCs to configure defensive mechanisms and improve attack detection. 

2. TA0002: Execution

Once attackers gain initial access, the Execution phase begins. This stage involves deploying malicious payloads or executing harmful commands on the compromised device. In the Interlock ransomware attacks, users unknowingly launch a fake updater file, triggering the execution of malware and allowing attackers to establish control over the victim’s system. 

How Interlock Group Executes Their Attacks

The reports revealed that the attackers leveraged Remote Access Tools (RATs), which provided them with full control of the infected machine. By disguising these RATs as legitimate software, such as Chrome, MSTeams, or Microsoft Edge updaters, the attackers ensured that their actions remained unnoticed until significant damage was done. 

Detecting Encrypted URLs in Fake Updaters

With ANY.RUN Sandbox, analysts could uncover that the fake-updater contained encrypted URLs used to communicate with the attackers’ infrastructure. For example, the xor-url tag in ANY.RUN revealed hidden URLs within the malware’s configuration files. 

View analysis session 

The CFG label indicates that there is a configuration data available for the process 

By clicking on the CFG (Configuration) option in the sandbox, analysts can view decrypted URLs. These insights provide actionable intelligence about the malware’s communication methods and help identify similar patterns in future attacks. 

The URL decrypted by ANY.RUN 

Using YARA Search to Find More Samples

ANY.RUN’s YARA Search functionality allowed researchers to create a rule for detecting RAT samples linked to the attack.  

Here’s an example of a YARA rule tailored for identifying Interlock’s disguised RAT samples: 

rule Interlock_RAT {  

    strings:  

        $ = "/MSTeamsSetup.exe\" xor  

        $ = "/ChromeSetup.exe\" xor  

        $ = "/MicrosoftEdgeSetup.exe\" xor  

    condition:  

        any of them  

} 

This YARA rule uncovered over 44 new malicious files, each representing a new indicator.

YARA Search in TI Lookup 

These IOCs can be added to detection systems, expanding the scope of protection. 

Discovering Additional IOCs 

In addition to detecting malicious files, ANY.RUN’s sandbox session revealed network IOCs such as URLs and IP addresses that previously were not covered in other reports. 

One of the URLs found via TI Lookup and not mentioned in Talos’s report

The URL shown above was not included in the detailed report from Talos.  

Had the organizations encountering this URL and payload used ANY.RUN’s Interactive Sandbox, they would be able to run the RAT in a safe virtual environment and see its malicious nature. This could have prevented them from detonating the payload on their own systems. 

During Execution, ANY.RUN helps users: 

  • Discover IOCs: Find additional file and network IoCs, including those found in configurations. 
  • Find Unknown Threats: Discover previously unknown threats. 
  • Analyze Threats: Safely explore suspicious URLs and detonate payloads. 

3. TA0006: Credential Access 

Once attackers gain the ability to execute commands on a compromised system, their next move often involves stealing access credentials. In the Interlock ransomware attack, the group employed a custom stealer tool to gather and exfiltrate these credentials. 

How Credential Stealing Works in This Attack

  • The attackers’ stealer was designed to collect sensitive data, including usernames, passwords, and other access credentials. 
  • According to vendor reports, the stolen data was stored in a file named “chrgetpdsi.txt.” This file served as a repository for harvested credentials before exfiltration. 

Let’s use TI Lookup to find more information on the stealer:  

Results of a TI Lookup search for a txt file used in the attack

As a result, we see that the Stealer had been detected by ANY.RUN as early as August 2024, well before users began investigating the compromised domain. 

The first sandbox report on the stealer used by Interlock 

Early detection of malicious tools like this Stealer provides security teams with actionable intelligence to defend against evolving threats. 

4. TA0008: Lateral Movement 

At the Lateral Movement phase, attackers aim to spread across the network, gaining access to additional systems and resources.  

The Interlock ransomware group moved laterally within networks using legitimate remote administration tools like Putty, Anydesk, and RDP. These tools are often abused by attackers to access additional systems undetected. 

TI Lookup Queries 
Putty  threatName:”putty”
Anydesk  threatName:”anydesk”
RDP  threatName:”rdp”

The ANY.RUN Sandbox excels at identifying the presence of these tools when they are abused for malicious purposes.

Signature in ANY.RUN’s Interactive Sandbox indicating the presence of Putty

By executing suspicious files in a controlled environment, ANY.RUN can: 

  • Detect the execution of Putty, Anydesk, or RDP-related activities. 
  • Provide detailed insights into how these tools are being used by attackers. 


ANY.RUN cloud interactive sandbox interface

Sandbox for Business

Discover all features of the Enterprise plan designed for businesses and large security teams.



5. TA0010: Data Exfiltration 

In the Data Exfiltration phase, attackers transfer stolen data out of the victim’s network. The Interlock ransomware group used Azure cloud storage to exfiltrate data. 

Inside the ANY.RUN sandbox, you can see the system configuration data being sent to a Command and Control (C2) server via the RAT. 

ANY.RUN captures data sent by the RAT to attacker-controlled servers. For this example, logs revealed information sent to IP 217[.]148[.]142[.]19 over port 443: 

Network traffic of the RAT captured by ANY.RUN’s Interactive Sandbox

Using tools like CyberChef, we can decrypt the logged traffic (e.g., XOR-encrypted data) to identify what attackers exfiltrated. 

Decryption with CyberChef shows that the RAT sent system data to attackers

Thus, during the Data Exfiltration phase, ANY.RUN Sandbox logs traffic sent to external systems, allowing analysts to identify exactly what data is being transmitted to the attacker’s server. 

ANY.RUN’s Key Benefits for Healthcare Organizations

ANY.RUN empowers healthcare organizations with fast, safe, and effective tools to investigate and analyze cyber threats: 

  • Pin malicious indicators to actual threats to gain a better understanding of the risks your organization is facing.  
  • Receive in-depth reports with IOCs, TTPs, and malware behavior summaries. 
  • Simplify and speed up threat analysis for SOC team members at all levels, saving time and increasing productivity.
  • Accelerate the alert triage process and reduce the workload through fast operation speeds, a user-friendly interface, and smart automation.
  • Safely examine sensitive data in a private mode, ensuring compliance with cybersecurity and data protection requirements.
  • Gain access to detailed insights into malware’s behavior and better understand threats to streamline incident response.
  • Collaborate with team members, share results, and coordinate efforts efficiently during incident handling.
  • Optimize the cost of responding to incidents by accessing detailed data with ANY.RUN’s interactive analysis, which helps in developing new detection and protection methods.

Conclusion 

ANY.RUN can be an invaluable tool at various stages of ransomware attacks. During incident investigations, TI Lookup can provide critical data on the threat at hand. Running malware in the ANY.RUN Sandbox before executing it on a local machine allows for a proactive identification of the threat and thorough analysis of its behavior.

By combining ANY.RUN’s tools, healthcare organizations can not only enhance the understanding of the threats’ capabilities but also ensure that they are identified and mitigated effectively. 

About ANY.RUN

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

Request free trial of ANY.RUN’s services → 

The post How ANY.RUN Helps Healthcare Organizations Against Ransomware: Interlock Case Study appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More