Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    24/01/2022, 06:28

General

  • Target

    034580c52732e52a382f4d550c34f09c.exe

  • Size

    884KB

  • MD5

    034580c52732e52a382f4d550c34f09c

  • SHA1

    bd4f5d3d0ca9d9d80f001666435f5d88006e75b8

  • SHA256

    185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430

  • SHA512

    300f9215a323e87d808791381bfc6e56d5fdfd8c0dcf9ceb19474e30e67557951d501da4a7a6cfdd5992450dc17bdd37144f342ab5ec9f7ec0f449e703c79074

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034580c52732e52a382f4d550c34f09c.exe
    "C:\Users\Admin\AppData\Local\Temp\034580c52732e52a382f4d550c34f09c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\extrac32.exe
      "C:\Windows\SysWOW64\extrac32.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:1876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1088-54-0x00000000012B0000-0x0000000001394000-memory.dmp

    Filesize

    912KB

  • memory/1088-55-0x0000000000C20000-0x0000000000CC2000-memory.dmp

    Filesize

    648KB

  • memory/1088-56-0x0000000000930000-0x0000000000946000-memory.dmp

    Filesize

    88KB

  • memory/1088-57-0x0000000004C40000-0x0000000004C41000-memory.dmp

    Filesize

    4KB

  • memory/1876-58-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1876-59-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1876-60-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1876-61-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1876-62-0x0000000075341000-0x0000000075343000-memory.dmp

    Filesize

    8KB

  • memory/1876-63-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB