Analysis

  • max time kernel
    185s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:52

General

  • Target

    61aa6f87fbfa2ff363d759f5a93c34097cab6451b63f696c4a9facc24be64555.exe

  • Size

    53KB

  • MD5

    18c0bbe2020986f0caebe8cab902c35a

  • SHA1

    999fe0fa4b1081f159583a2fdea1084d7b433399

  • SHA256

    61aa6f87fbfa2ff363d759f5a93c34097cab6451b63f696c4a9facc24be64555

  • SHA512

    72abddfa8722c5a1d87cfb7e8cb99916cb62d5ebd5886ff00a2ace601c6d6b057080668d006fc15f7ec72bccafd167e01df7d823921cd5e658946ededaefa032

Malware Config

Extracted

Path

C:\[ ReStore Files ].html

Ransom Note
<html> <style type="text/css"> body { background-color: #800000; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO RESTORE YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your ID</h3></div> <div class="identi"> <pre>��������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your files are encrypted! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> To recover data you need decryptor.</br> To get the decryptor you should:</br> <p>Send 1 image file or text file for test <h3> [email protected] or [email protected]</h3>.</br> In the letter include your ID (look at the beginning of this document).</p> We will give you the decrypted file and assign the price for decryption all files</p> After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions We can decrypt one file in quality the evidence that we have the decoder.</br> <center><h3>Attention!</h3></center></br> <ul> <li>Only [email protected] or [email protected] can decrypt your files</li> <li>Do not trust anyone [email protected] or [email protected]</li> <li>Do not attempt to remove the program or run the anti-virus tools</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> �������������

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 13 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61aa6f87fbfa2ff363d759f5a93c34097cab6451b63f696c4a9facc24be64555.exe
    "C:\Users\Admin\AppData\Local\Temp\61aa6f87fbfa2ff363d759f5a93c34097cab6451b63f696c4a9facc24be64555.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:3256
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4948
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4948-130-0x0000029562330000-0x0000029562340000-memory.dmp

    Filesize

    64KB

  • memory/4948-131-0x0000029562390000-0x00000295623A0000-memory.dmp

    Filesize

    64KB

  • memory/4948-132-0x0000029565090000-0x0000029565094000-memory.dmp

    Filesize

    16KB