Analysis

  • max time kernel
    175s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:26

General

  • Target

    e25354c7a781079e5e9f6300d3bf1cd3a766750b405152988331d0518660e835.exe

  • Size

    53KB

  • MD5

    11aee7ae93261d9586737f9ad7c013f5

  • SHA1

    eb8c23eadcf9fa5689ad25f1f992e1163745e001

  • SHA256

    e25354c7a781079e5e9f6300d3bf1cd3a766750b405152988331d0518660e835

  • SHA512

    2afaedd514f51fcdc36d45cdedaaebb0d4fa9fc0a7694ed3f0865ae91da93a410f30dc89da8d69a07b083e0dbfffd00ad246901ee80cf9e72bf9815918723966

Malware Config

Extracted

Path

C:\HOW_TO_BACK_FILES.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>���������������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your files are encrypted! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> <h3>To recover data you need decryptor.</br> To get the decryptor you should:</br> 1. Copy your personal ID. You can find it at the beginning of this page<br> 2. Contact support by email [email protected] or [email protected] and send your personal ID.</h3> In the first letter to us you can attach one encrypted file for free decrypt. We can decrypt one file in quality the evidence that we have the decoder.</br> <center>Attention!</center></br> <ul> <li>If files locked on multiple PC's of your company we will provide universal decryptor for all computers in your network. Please let us know if files encrypted on multiple PCs</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> �����������

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 21 IoCs
  • Drops file in Windows directory 7 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e25354c7a781079e5e9f6300d3bf1cd3a766750b405152988331d0518660e835.exe
    "C:\Users\Admin\AppData\Local\Temp\e25354c7a781079e5e9f6300d3bf1cd3a766750b405152988331d0518660e835.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:3148
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1284
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2188
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2188 -s 4636
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1832
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:2404
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:3572
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 408 -p 2188 -ip 2188
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:2980
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2248
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1480
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1480 -s 3848
        2⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4876
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 420 -p 1480 -ip 1480
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:3368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1284-130-0x00000235C6720000-0x00000235C6730000-memory.dmp

      Filesize

      64KB

    • memory/1284-132-0x00000235C8E30000-0x00000235C8E34000-memory.dmp

      Filesize

      16KB

    • memory/1284-131-0x00000235C6940000-0x00000235C6950000-memory.dmp

      Filesize

      64KB

    • memory/2404-142-0x000001EEEE800000-0x000001EEEE804000-memory.dmp

      Filesize

      16KB