Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    12-12-2021 12:43

General

  • Target

    2c72015e22b53c215403979536bce826.exe

  • Size

    454KB

  • MD5

    2c72015e22b53c215403979536bce826

  • SHA1

    39eb8e3c2cef23d1c7a3f5c3133f40ecc98c1cf1

  • SHA256

    36035b1a4995acb201c2b2160000d4477a31a2222c3f6bdc25a32d53d930bcfd

  • SHA512

    0d2e590b0c32de661ab94c0f7a0eccbbc2bac637120b0148e04b05a826ca5858e6d147e0011bd5094f260e5ff0d3dafbf9bc2c4df099adc3ac5c98d50b6df4b1

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 27 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c72015e22b53c215403979536bce826.exe
    "C:\Users\Admin\AppData\Local\Temp\2c72015e22b53c215403979536bce826.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
      2⤵
      • Modifies extensions of user files
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:1316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1316-124-0x0000000000409F20-mapping.dmp

  • memory/1316-127-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1316-126-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/1316-125-0x0000000000A90000-0x0000000000A91000-memory.dmp

    Filesize

    4KB

  • memory/1316-123-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3140-118-0x0000000003080000-0x000000000311C000-memory.dmp

    Filesize

    624KB

  • memory/3140-121-0x0000000006A80000-0x0000000006A8D000-memory.dmp

    Filesize

    52KB

  • memory/3140-122-0x0000000006B80000-0x0000000006BA3000-memory.dmp

    Filesize

    140KB

  • memory/3140-120-0x00000000058D0000-0x0000000005950000-memory.dmp

    Filesize

    512KB

  • memory/3140-119-0x00000000030C0000-0x00000000030F8000-memory.dmp

    Filesize

    224KB

  • memory/3140-115-0x0000000000E30000-0x0000000000E31000-memory.dmp

    Filesize

    4KB

  • memory/3140-117-0x0000000003090000-0x0000000003093000-memory.dmp

    Filesize

    12KB

  • memory/3140-116-0x00000000056C0000-0x00000000056C1000-memory.dmp

    Filesize

    4KB