Analysis

  • max time kernel
    167s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 06:34

General

  • Target

    bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4.exe

  • Size

    53KB

  • MD5

    2eff80c8b1c01cdaf739bf8072ffe58b

  • SHA1

    babeda04ca96e3337fbf6336fb74304fbe2cc11a

  • SHA256

    bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4

  • SHA512

    9e191e81c76eda4ceb4364be81742bfcee7ff74dcb459a88fffdc48e5d5918e45f761db4fa4c25bba195a5d9f7a8a3cadfcf027310683fb3a4adc26d8a79fd38

Malware Config

Extracted

Path

C:\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">����������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span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price (BITCOIN) and get decryption software.</b><br><br> <a href="mailto:[email protected]">[email protected]</a><br> <a href="mailto:[email protected]">[email protected]</a> <hr> </div> <div class="text"> Make contact as soon as possible. Your private key (decryption key) is only <br> stored temporarily.<br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.<br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>�������������
Emails

href="mailto:[email protected]">[email protected]</a><br>

href="mailto:[email protected]">[email protected]</a>

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4.exe
    "C:\Users\Admin\AppData\Local\Temp\bfa17ca04282f57abf8bff68adb1effb580cf1eeace3b793cc7f0d470ed2ffb4.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-55-0x0000000076731000-0x0000000076733000-memory.dmp

    Filesize

    8KB