Analysis

  • max time kernel
    163s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 06:33

General

  • Target

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe

  • Size

    52KB

  • MD5

    58fd0867cc3b0084a620025eb08fec54

  • SHA1

    e886e4cc71f5f54625fb000cc9709929bdbaf05a

  • SHA256

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

  • SHA512

    5bea2fbd601e26f0ad2c4191198f54dffc6e19f1d1d85c670f7a1a7ad5b475b97865fe6eb68e031c242c2f3d12b074782e43da7132259cc6fe04875ba7d2c385

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 25Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ������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span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>�����
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1896-54-0x0000000076C61000-0x0000000076C63000-memory.dmp

    Filesize

    8KB