Analysis

  • max time kernel
    158s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:32

General

  • Target

    39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe

  • Size

    51KB

  • MD5

    e4e439fc5ade188ba2c69367ba6731b6

  • SHA1

    d4b3b403b95d50a2feefa046441600e488b941f4

  • SHA256

    39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde

  • SHA512

    068d7ba1563bf528520a5106a99245896578ac88b0a3263383cdae8657403deba659c06f429dd83710d1f5afa324a49254dd68911382db71810f98a498e901e7

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 23 IoCs
  • Drops file in Windows directory 7 IoCs
  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe
    "C:\Users\Admin\AppData\Local\Temp\39f5b60188d49196e6c10271a084a755f9553190898438b15107cdb950a4bbde.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:1404
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3164
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1868 -s 4764
      2⤵
      • Program crash
      PID:1364
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1868 -s 4764
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:4220
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:4004
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:4396
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 428 -p 1868 -ip 1868
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:696
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2220
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2220 -s 3900
        2⤵
        • Program crash
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3888
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3988
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 492 -p 2220 -ip 2220
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious use of WriteProcessMemory
      PID:4360
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:1460

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2220-153-0x0000025177400000-0x0000025177500000-memory.dmp

        Filesize

        1024KB

      • memory/3164-130-0x000001BDC3B30000-0x000001BDC3B40000-memory.dmp

        Filesize

        64KB

      • memory/3164-131-0x000001BDC3B90000-0x000001BDC3BA0000-memory.dmp

        Filesize

        64KB

      • memory/3164-132-0x000001BDC6880000-0x000001BDC6884000-memory.dmp

        Filesize

        16KB

      • memory/4004-139-0x000001BBFB2F0000-0x000001BBFB2F4000-memory.dmp

        Filesize

        16KB