Analysis

  • max time kernel
    179s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    11/02/2022, 06:33

General

  • Target

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe

  • Size

    52KB

  • MD5

    58fd0867cc3b0084a620025eb08fec54

  • SHA1

    e886e4cc71f5f54625fb000cc9709929bdbaf05a

  • SHA256

    c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186

  • SHA512

    5bea2fbd601e26f0ad2c4191198f54dffc6e19f1d1d85c670f7a1a7ad5b475b97865fe6eb68e031c242c2f3d12b074782e43da7132259cc6fe04875ba7d2c385

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 25Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ������0F 3A E7 2A 22 8A 1E 8A 77 93 D7 44 44 48 B8 E4 ED 0F A2 BE 11 3C 05 CE 20 71 43 DA 98 80 26 8F A5 60 E9 1A 38 4A 92 EB 23 E4 28 0B CB 82 9F 7E A9 E3 74 03 BA 64 C2 55 6D 73 CB 0B 72 21 0C 0E 57 FF D7 75 98 3E C9 B2 D3 A8 FF 4E 32 0E 3B 40 C0 A3 FE 50 7B 39 EB 4C DB E6 91 D6 0D EC EA 47 9D 45 69 FF 74 0E CB A6 B3 5D 3A B5 79 30 5D 2E E6 C8 E9 63 A5 F8 D9 F3 8D 7F 25 2E F4 1A 54 3F 8D 97 6A 7F 9C 1C 03 A0 1C 03 43 55 17 D5 55 F8 85 A6 4B C1 78 1B 68 24 0E EE 19 7A 96 59 8B 77 AA 0E 13 25 BA 72 85 3E 68 67 8A 79 A3 8B BA 32 48 4C 11 FD 27 3B A2 DE D0 0C C9 8D 09 C5 96 DC B3 53 18 F8 1A 9C 5C A8 E7 62 4B AE 39 CA D0 93 92 5F 2F 39 2D 70 78 E3 0D A3 12 E7 7A 97 A1 E7 D6 4F F6 8A 3C 11 98 D6 CD CE 70 CF 10 46 19 84 12 20 C7 91 D6 D7 9A 8E 74 6F F9 7D 65 40 AF 3D .</span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>�����
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d8c6b85e5e0de3cba8bf5f3ede4e27f3e29fc85e3dcbbb5477775d8a12c186.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:1132
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
      PID:3540

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads