Analysis
-
max time kernel
164s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
53KB
-
MD5
01a6c1720a2d8fa6a38691d937229d18
-
SHA1
02868596aff23e1cfd591c8a0fff2d0124b744a5
-
SHA256
13566c392034d0c9f37d7bddc91d43f00d114efb9615907f6c4052e7c89c2e48
-
SHA512
8e80f2e2c193af0d255a2d9c03c93964d94f921ddd745c9f5edab04bce6d4c7bc7648c7b05bec5e4d4e61c3cc9641b7776582a1ea9dc74cb9884a29c919170d5
Score
10/10
Malware Config
Extracted
Path
C:\how_to_back_files.html
Ransom Note
<html>
<style type="text/css">
body {
background-color: #404040;
}
{
margin: 0;
padding: 0;
}
h1, h3{
text-align: center;
text-transform: uppercase;
font-weight: normal;
}
/*---*/
.tabs1{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs1 .head{
text-align: center;
float: top;
text-transform: uppercase;
font-weight: normal;
display: block;
padding: 15px;
color: #000000;
background: #4A83FD;
}
.tabs1 .identi {
margin-left: 15px;
line-height: 13px;
font-size: 13px;
text-align: center;
float: top;
display: block;
padding: 15px;
background: #303030;
color: #DFDFDF;
}
/*---*/
.tabs{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs .tab{
float: left;
display: block;
}
.tabs .tab>input[type="radio"] {
position: absolute;
top: -9999px;
left: -9999px;
}
.tabs .tab>label {
display: block;
padding: 6px 21px;
font-size: 18x;
text-transform: uppercase;
cursor: pointer;
position: relative;
color: #FFF;
background: #4A83FD;
}
.tabs .content {
z-index: 0;/* or display: none; */
overflow: hidden;
width: 800px;
/*padding: 25px;*/
position: absolute;
top: 32px;
left: 0;
background: #303030;
color: #DFDFDF;
opacity:0;
transition: opacity 400ms ease-out;
}
.tabs .content .text{
width: 700px;
padding: 25px;
}
.tabs>.tab>[id^="tab"]:checked + label {
top: 0;
background: #303030;
color: #F5F5F5;
}
.tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] {
z-index: 1;/* or display: block; */
opacity: 1;
transition: opacity 400ms ease-out;
}
</style>
<head>
<meta charset="utf-8">
<title>HOW TO DECRYPT YOUR FILES</title>
</head>
<body>
<div class="tabs1">
<div class="head" ><h3>Your personal ID</h3></div>
<div class="identi">
<pre>���������������75 BF 60 86 2D 5F 83 E8 F6 4A F0 38 DE B1 A2 71
8D 0A D5 95 95 E0 D7 E2 00 B4 0D 52 DE 86 B7 1B
C7 71 69 72 29 13 E1 1B 0B 40 77 32 33 12 AD D0
36 56 E9 CF 37 D8 35 E5 B5 1C B5 18 90 85 07 38
9D 29 BD F8 36 E8 37 A4 58 A4 5F A5 D5 DC AD C0
18 7A 3D 4D 43 47 50 A0 E2 69 19 B2 1B C6 22 C6
BC 7D 47 88 DC 97 3C 56 37 16 32 6E 49 25 E3 AD
C6 1D 48 DD 26 08 0A F6 46 01 A2 D9 F0 0E 1B 0E
50 58 28 B0 86 E8 A4 3F 05 60 83 10 22 D1 DB 26
43 25 C4 3A 09 00 DD E5 F3 65 1D 43 82 6C 2A 5B
7C BA 7D B2 FA EF F9 21 53 E5 32 39 05 F6 C8 8D
28 49 BB AF B1 EE 7B E1 7B F7 BE 6E 39 59 75 17
22 CE 06 9D 0F 65 72 B5 D2 17 97 47 E4 78 B1 BD
09 7A F2 69 7D BF 2A 47 E4 E3 75 6E CD 62 A9 2F
7C F8 9B F0 B4 74 70 C0 69 DA 2C 98 89 C6 1D 35
A8 3E 2E D8 CE 86 66 D2 24 42 CE 76 F8 83 8C 11
</pre><!-- !!! dont changing this !!! -->
</div>
</div>
<!-- -->
<div class="tabs">
<!--tab-->
<div class="tab">
<input type="radio" name="tabs" checked="checked" id="tab1" />
<label for="tab1">English</label>
<div id="tab-content1" class="content">
<h1>☠ Your files are encrypted! ☠</h1>
<hr/>
<h3>All your important data has been encrypted.</h3>
<br/>
<div class="text">
<!--text data -->
To recover data you need decryptor.</br>
To get the decryptor you should:</br>
<p>Send 1 test image or text file <span><strong><h1> [email protected]<br>
[email protected]</h1></strong></span></br>
In the letter include your personal ID (look at the beginning of this document).</p>
We will give you the decrypted file and assign the price for decryption all files</p>
After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions
We can decrypt one file in quality the evidence that we have the decoder.</br>
<center>Attention!</center></br>
<ul>
<li>Only [email protected] and
[email protected] can decrypt your files</li>
<li>Do not trust anyone [email protected] and
[email protected]</li>
<li>Do not attempt to remove the program or run the anti-virus tools</li>
<li>Attempts to self-decrypting files will result in the loss of your data</li>
<li>Decoders other users are not compatible with your data, because each user's unique encryption key</li>
</ul>
<!--text data -->
</div>
</div>
</div>
<!--tab-->
</ul>
<!--text data -->
</div>
</div>
<!--tab-->
</div>
</div>
</body>
</html>
��������
Emails
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UseExport.tif => C:\Users\Admin\Pictures\UseExport.tif.xxx sample.exe File opened for modification C:\Users\Admin\Pictures\SearchResume.tiff sample.exe File renamed C:\Users\Admin\Pictures\SearchResume.tiff => C:\Users\Admin\Pictures\SearchResume.tiff.xxx sample.exe File renamed C:\Users\Admin\Pictures\StopSync.png => C:\Users\Admin\Pictures\StopSync.png.xxx sample.exe File renamed C:\Users\Admin\Pictures\SuspendAdd.png => C:\Users\Admin\Pictures\SuspendAdd.png.xxx sample.exe File opened for modification C:\Users\Admin\Pictures\SuspendTrace.tiff sample.exe File renamed C:\Users\Admin\Pictures\SuspendTrace.tiff => C:\Users\Admin\Pictures\SuspendTrace.tiff.xxx sample.exe File renamed C:\Users\Admin\Pictures\CompareApprove.crw => C:\Users\Admin\Pictures\CompareApprove.crw.xxx sample.exe File renamed C:\Users\Admin\Pictures\ImportDismount.crw => C:\Users\Admin\Pictures\ImportDismount.crw.xxx sample.exe File renamed C:\Users\Admin\Pictures\UnregisterWait.raw => C:\Users\Admin\Pictures\UnregisterWait.raw.xxx sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\sample.exe" sample.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce sample.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini sample.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini sample.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini sample.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini sample.exe File opened for modification C:\Users\Public\Videos\desktop.ini sample.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini sample.exe File opened for modification C:\Users\Admin\Music\desktop.ini sample.exe File opened for modification C:\Program Files (x86)\desktop.ini sample.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini sample.exe File opened for modification C:\Users\Public\Documents\desktop.ini sample.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini sample.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini sample.exe File opened for modification C:\Users\Public\desktop.ini sample.exe File opened for modification C:\Users\Public\Libraries\desktop.ini sample.exe File opened for modification C:\Users\Public\Desktop\desktop.ini sample.exe File opened for modification C:\Users\Public\Pictures\desktop.ini sample.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini sample.exe File opened for modification C:\Users\Admin\Documents\desktop.ini sample.exe File opened for modification C:\Users\Admin\Videos\desktop.ini sample.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini sample.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini sample.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini sample.exe File opened for modification C:\Users\Public\Downloads\desktop.ini sample.exe File opened for modification C:\Users\Admin\Searches\desktop.ini sample.exe File opened for modification C:\Users\Admin\Links\desktop.ini sample.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini sample.exe File opened for modification C:\Users\Public\Music\desktop.ini sample.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDSLM.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUDIOSEARCHLTS.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryResume.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielMergeFax.Dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\OFFISUPP.HTM sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Tags.accft sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.HTM sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveMergeLetter.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.JPG sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSRuntime.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.JPG sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCVDT.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVZIP.DIC sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENVELOPE.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnvpxy.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Explorer.zip sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Form.zip sample.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\how_to_back_files.html sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRMV.XML sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ENGLISH.LNG sample.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log sample.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\SynchronizationEula.rtf sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginReport.Dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Start End Dates.accft sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ASCIIENG.LNG sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\1100.accdt sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CharSetTable.chr sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\MDIParent.zip sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfigInternal.zip sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieLetter.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACEDAO.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Visualizer.zip sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieNewsletter.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieResume.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\AUTHZAX.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadataresource.xsd sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Custom.propdesc sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.Adapter.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Faculty.accdt sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.GIF sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\ResourceInternal.zip sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Phone.accft sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.HTM sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyMergeLetter.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BlackTieMergeLetter.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_schemas14.xss sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfoInternal.zip sample.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\how_to_back_files.html sample.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\how_to_back_files.html sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSProxy32.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GFX.DLL sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe sample.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\VSTAProject.dll sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialResume.dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielMergeLetter.Dotx sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT sample.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\how_to_back_files.html sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Tasks.accdt sample.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\how_to_back_files.html sample.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianReport.Dotx sample.exe