Analysis

  • max time kernel
    166s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11/02/2022, 06:37

General

  • Target

    b0218cc130eb7bf6919249d5e45e085a6196381213ba215f3ac4e95faac05ed1.exe

  • Size

    55KB

  • MD5

    31b00898b80e8969e66e730751e6bc0b

  • SHA1

    77776298181a2796133335760875416f28869c88

  • SHA256

    b0218cc130eb7bf6919249d5e45e085a6196381213ba215f3ac4e95faac05ed1

  • SHA512

    423ca1880a4b649d186d03e7cadd3ce6abbf69795c5be8eedd5a36a7728beda785dadcbd64ae56da7bb7895f3ec9fe72f84e061a10cd8073d38b5e61df11ca4f

Malware Config

Extracted

Path

C:\HOW_TO_RESTORE_FILES.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> <style> html, body {height:100%; color: #fff; font-family: monospace; background-color: #000;} a,h1,h2,h3,h4,h5,h6 {color: #fff;text-decoration: none;} a:hover {color: #aaa;} ul {list-style: square outside;padding: 15px;} .wrap { position:relative; width: 850px; margin: 0px auto ; height:auto !important; height:100%; min-height:100%;} .contentdiv {padding:10px;} .heading { text-align: center; font-size: 25px; letter-spacing: 0px; font-weight: 700; text-transform: uppercase;} .mould{ width: 400px; display: block; margin: auto; text-align: center; position: relative;} .mould .main{ padding: 10px; margin: 5px; border-radius: 6px;} .mould .main-part { padding: 10px; font-size: 12px; font-weight: 700; background-color: #252525; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAAECAYAAACp8Z5+AAAAJ0lEQVQYV2NkYGD4z8vLywADjLy8vP/hPAYGBrjA58+fGUAqMVQAAPnKB51wUh2MAAAAAElFTkSuQmCC) repeat;} .mould .id-text{color: #B22222; text-align: left;} .mould .ID{overflow: auto;} .content { width: 800px; display: block; margin: auto; position: relative;} .text-data{ width: 800px; padding: 10px; font-size: 14px;} .attention { margin: 15px auto; text-align: center; font-size: 20px; color: #fff; font-weight: 700; text-transform: uppercase;} .emails { background: #191919; color: #34dddd; padding: 2px 5px; border-radius: 4px;} .tech {border-left: 5px solid #3CB371;} .our { height: auto; padding-bottom: 0; padding-left: 5px;} .our .support { font-weight: bold; text-indent: 5px; height: 10px; line-height: 20px; padding-top: 5px;} .our ul {margin-top: 0;} .our ul li {padding: 1px;} </style> </head> <body> <!-- Head --> <div class="wrap"> <div class="contentdiv"> <div class="heading">&#9760; Your files are encrypted &#9760;</div><br /> <div class="mould"> <div class="main"> <div class="main-part"> <div class="id-text">// Your personal ID</div> <div class="ID"> <pre>�������������71 5F 4B A5 80 2A CC 7F AC D0 9E B0 87 DF D2 A6 8F 13 C1 51 23 6E 82 C3 36 CE C3 8B 12 69 8A 29 69 61 8A 4F DB 7C 9D 50 F7 83 EF 01 47 6E B3 12 10 D6 0F B6 3F 07 67 2F B8 61 78 CA FB 8B 31 32 76 78 B6 A0 43 4C C3 B5 CF 32 F8 CA 82 E7 17 79 85 70 DC 27 19 CE EE 0D 16 82 A5 DF E4 1C A5 08 D5 0D 35 C3 A5 CB 39 DD 1B 62 CD 77 04 B9 A9 80 F1 10 E8 5F C0 B7 76 38 A5 80 79 99 5D 88 0D 90 FC 7B B3 1D 22 22 6A EF 4E 30 5A B3 02 F7 28 8E 62 7B 21 50 BB 99 5A 96 31 95 BD BE A8 1E 8D 2E 09 67 11 5A 1F D0 85 D7 E3 03 62 92 1C 9E AA BA 23 F1 A8 37 2C F7 C2 5B B2 89 E1 B2 08 28 96 C0 E2 E2 24 A1 EE 75 37 0A 0C 43 1E 7A 15 6E 87 EE 8F 76 80 C1 9D CE A4 CE 2E F2 D6 0B 4F 0B 52 7A E0 E1 F8 95 8B DA 87 24 73 32 E1 D6 AC 58 E1 23 AC C4 0C CE 03 51 C8 98 6F 27 51 A6 F2 A6 37 24 </pre> </div> </div> </div> </div> <!-- end --> <!-- index --> <div class="content"> <!--tab--> <hr align="center" width="800" color="White" /> <h3>ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED</h3> <br /> <!-- end --> <!--text data --> <div class="text-data"> To recover data you need decryptor.<br /> To get the decryptor you should:<br /> <p>Send 3 test file not more than 10Mb: <span class="emails">[email protected]</span> or <span class="emails">[email protected]</span><br /> In the letter include <span style="color:#B22222">your personal ID</span><br /> You have to pay for decryption in Bitcoins.<br /> The price depends on how fast you write to us.<br /> After payment we will send you the decryption tool that will decrypt all your files.<br /> <div class="our tech"> <div class="support"> <span style="color:#006400">Our tech support is available 24\7</span></div> <ul> <li>Do not delete: Your personal ID</li> <li>Write on e-mail, we will help you! </ul> </div> <div class="attention">&#9888; Attention &#9888;</div> <ul> <li>Do not rename encrypted files.</li> <li>Do not try to decrypt your data using third party software, it may cause permanent data loss.</li> <li>Decryption of your files with the help of third parties may cause increased price<br /> [they add their fee to our] or you can become a victim of a scam.</li> <li>Do not attempt to remove the program or run the anti-virus tools</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders are not compatible with other users of your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> </div> </body> </html>���
Emails

class="emails">[email protected]</span>

class="emails">[email protected]</span><br

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0218cc130eb7bf6919249d5e45e085a6196381213ba215f3ac4e95faac05ed1.exe
    "C:\Users\Admin\AppData\Local\Temp\b0218cc130eb7bf6919249d5e45e085a6196381213ba215f3ac4e95faac05ed1.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:4272
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4492-130-0x00000194B8160000-0x00000194B8170000-memory.dmp

    Filesize

    64KB

  • memory/4492-131-0x00000194B8820000-0x00000194B8830000-memory.dmp

    Filesize

    64KB

  • memory/4492-132-0x00000194BAEE0000-0x00000194BAEE4000-memory.dmp

    Filesize

    16KB