Analysis

  • max time kernel
    157s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 06:28

General

  • Target

    034580c52732e52a382f4d550c34f09c.exe

  • Size

    884KB

  • MD5

    034580c52732e52a382f4d550c34f09c

  • SHA1

    bd4f5d3d0ca9d9d80f001666435f5d88006e75b8

  • SHA256

    185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430

  • SHA512

    300f9215a323e87d808791381bfc6e56d5fdfd8c0dcf9ceb19474e30e67557951d501da4a7a6cfdd5992450dc17bdd37144f342ab5ec9f7ec0f449e703c79074

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\034580c52732e52a382f4d550c34f09c.exe
    "C:\Users\Admin\AppData\Local\Temp\034580c52732e52a382f4d550c34f09c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\SysWOW64\charmap.exe
      "C:\Windows\SysWOW64\charmap.exe"
      2⤵
        PID:3032
      • C:\Windows\SysWOW64\auditpol.exe
        "C:\Windows\SysWOW64\auditpol.exe"
        2⤵
          PID:3792
        • C:\Windows\SysWOW64\powercfg.exe
          "C:\Windows\SysWOW64\powercfg.exe"
          2⤵
          • Modifies extensions of user files
          • Drops desktop.ini file(s)
          • Drops file in Program Files directory
          • Suspicious behavior: RenamesItself
          PID:3512

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2348-117-0x0000000000CF0000-0x0000000000DD4000-memory.dmp

        Filesize

        912KB

      • memory/2348-118-0x0000000005640000-0x00000000056DC000-memory.dmp

        Filesize

        624KB

      • memory/2348-119-0x00000000055A0000-0x0000000005642000-memory.dmp

        Filesize

        648KB

      • memory/2348-120-0x0000000005520000-0x0000000005536000-memory.dmp

        Filesize

        88KB

      • memory/2348-121-0x0000000005500000-0x0000000005591000-memory.dmp

        Filesize

        580KB

      • memory/3512-122-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/3512-125-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB