Analysis

  • max time kernel
    167s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    11-02-2022 06:56

General

  • Target

    5588fb6d626fa5f0e183859f05c75673a468fe8d144b69dc8c8fe6a631413383.exe

  • Size

    54KB

  • MD5

    b898d451eff721d1afbd4cc314d66030

  • SHA1

    196f8e9833c6ded3970be0656e71d366cc9847be

  • SHA256

    5588fb6d626fa5f0e183859f05c75673a468fe8d144b69dc8c8fe6a631413383

  • SHA512

    ae2365030a893fb4bc1b75de08552ad451dc9d85d405108d05901ea31e22015e27faf917f5df518033a057419535d157bc7c14644ad6a59816f9946025f504eb

Malware Config

Extracted

Path

C:\HOW_TO_RESTORE_FILES.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> <style> html, body {height:100%; color: #fff; font-family: monospace; background-color: #000;} a,h1,h2,h3,h4,h5,h6 {color: #fff;text-decoration: none;} a:hover {color: #aaa;} ul {list-style: square outside;padding: 15px;} .wrap { position:relative; width: 850px; margin: 0px auto ; height:auto !important; height:100%; min-height:100%;} .contentdiv {padding:10px;} .heading { text-align: center; font-size: 25px; letter-spacing: 0px; font-weight: 700; text-transform: uppercase;} .mould{ width: 400px; display: block; margin: auto; text-align: center; position: relative;} .mould .main{ padding: 10px; margin: 5px; border-radius: 6px;} .mould .main-part { padding: 10px; font-size: 12px; font-weight: 700; background-color: #252525; background:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAQAAAAECAYAAACp8Z5+AAAAJ0lEQVQYV2NkYGD4z8vLywADjLy8vP/hPAYGBrjA58+fGUAqMVQAAPnKB51wUh2MAAAAAElFTkSuQmCC) repeat;} .mould .id-text{color: #B22222; text-align: left;} .mould .ID{overflow: auto;} .content { width: 800px; display: block; margin: auto; position: relative;} .text-data{ width: 800px; padding: 10px; font-size: 14px;} .attention { margin: 15px auto; text-align: center; font-size: 20px; color: #fff; font-weight: 700; text-transform: uppercase;} .emails { background: #191919; color: #34dddd; padding: 2px 5px; border-radius: 4px;} .tech {border-left: 5px solid #3CB371;} .our { height: auto; padding-bottom: 0; padding-left: 5px;} .our .support { font-weight: bold; text-indent: 5px; height: 10px; line-height: 20px; padding-top: 5px;} .our ul {margin-top: 0;} .our ul li {padding: 1px;} </style> </head> <body> <!-- Head --> <div class="wrap"> <div class="contentdiv"> <div class="heading">&#9760; Your files are encrypted &#9760;</div><br /> <div class="mould"> <div class="main"> <div class="main-part"> <div class="id-text">// Your personal ID</div> <div class="ID"> <pre>�������������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pre> </div> </div> </div> </div> <!-- end --> <!-- index --> <div class="content"> <!--tab--> <hr align="center" width="800" color="White" /> <h3>ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED</h3> <br /> <!-- end --> <!--text data --> <div class="text-data"> To recover data you need decryptor.<br /> To get the decryptor you should:<br /> <p>Send 3 test file not more than 10Mb: <span class="emails">[email protected]</span> or <span class="emails">[email protected]</span><br /> In the letter include <span style="color:#B22222">your personal ID</span><br /> You have to pay for decryption in Bitcoins.<br /> The price depends on how fast you write to us.<br /> After payment we will send you the decryption tool that will decrypt all your files.<br /> <div class="our tech"> <div class="support"> <span style="color:#006400">Our tech support is available 24\7</span></div> <ul> <li>Do not delete: Your personal ID</li> <li>Write on e-mail, we will help you! </ul> </div> <div class="attention">&#9888; Attention &#9888;</div> <ul> <li>Do not rename encrypted files.</li> <li>Do not try to decrypt your data using third party software, it may cause permanent data loss.</li> <li>Decryption of your files with the help of third parties may cause increased price<br /> [they add their fee to our] or you can become a victim of a scam.</li> <li>Do not attempt to remove the program or run the anti-virus tools</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders are not compatible with other users of your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> </div> </body> </html>���
Emails

class="emails">[email protected]</span>

class="emails">[email protected]</span><br

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 24 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5588fb6d626fa5f0e183859f05c75673a468fe8d144b69dc8c8fe6a631413383.exe
    "C:\Users\Admin\AppData\Local\Temp\5588fb6d626fa5f0e183859f05c75673a468fe8d144b69dc8c8fe6a631413383.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:2300
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads