Analysis

  • max time kernel
    152s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    11-12-2021 01:22

General

  • Target

    d24c1c9f8c5abd584f6e120c9c2e4cca.exe

  • Size

    320KB

  • MD5

    d24c1c9f8c5abd584f6e120c9c2e4cca

  • SHA1

    77c65eff3bdbb9c3b42cc0fc3285577cd999167a

  • SHA256

    38df9f7ee6504ebae134f8f446caaa0cf9f7c2c258f51023bc7eddd68e5aad12

  • SHA512

    57370b7970c9bd4fa713f95a1799c8cdcb4857a4962357f1004a18b85ba8856af1273b0f9ef9aaffe54b7cb6cb8e71d60aebcd460caf789de5f9a3607e46eaea

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 26 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d24c1c9f8c5abd584f6e120c9c2e4cca.exe
    "C:\Users\Admin\AppData\Local\Temp\d24c1c9f8c5abd584f6e120c9c2e4cca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Modifies extensions of user files
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:3652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3652-123-0x0000000000409F20-mapping.dmp
  • memory/3652-127-0x0000000000400000-0x000000000040F000-memory.dmp
    Filesize

    60KB

  • memory/3652-125-0x0000000004510000-0x0000000004511000-memory.dmp
    Filesize

    4KB

  • memory/3652-124-0x0000000004510000-0x0000000004511000-memory.dmp
    Filesize

    4KB

  • memory/3652-122-0x0000000000400000-0x000000000040F000-memory.dmp
    Filesize

    60KB

  • memory/3988-118-0x0000000002520000-0x0000000002556000-memory.dmp
    Filesize

    216KB

  • memory/3988-121-0x0000000005EC0000-0x0000000005ED9000-memory.dmp
    Filesize

    100KB

  • memory/3988-120-0x0000000002590000-0x000000000259D000-memory.dmp
    Filesize

    52KB

  • memory/3988-119-0x0000000004C40000-0x0000000004C9E000-memory.dmp
    Filesize

    376KB

  • memory/3988-115-0x00000000001A0000-0x00000000001A1000-memory.dmp
    Filesize

    4KB

  • memory/3988-117-0x00000000024F0000-0x00000000024F3000-memory.dmp
    Filesize

    12KB

  • memory/3988-116-0x00000000049F0000-0x00000000049F1000-memory.dmp
    Filesize

    4KB

  • memory/3988-126-0x0000000002570000-0x0000000002571000-memory.dmp
    Filesize

    4KB