Analysis

  • max time kernel
    158s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 07:11

General

  • Target

    14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe

  • Size

    56KB

  • MD5

    6e11699bc2a423b584b4ec90031336dc

  • SHA1

    20a1e0ee0cc37b8d62e5c086ac1840d428c32049

  • SHA256

    14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c

  • SHA512

    af85335968fb72ef69d2dd92cda18edd84e29d226be9993d034cb44fa5ef2c941fc37dad4a001d5e23736d006f337a0be289f8d38f6f539ab53442a629cb5abf

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>���������������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your corporate network locked! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> <h3>To restore files you will need a decryptor!</h3> <center>To get the decryptor you should:</center></br> <center>Pay for decrypt your network - 1 BTC </center></br> <div align="left"> <strong>Buy BTC on one of these sites</strong> </div> <div align="left"> <ol> <li><strong>https://localbitcoins.com</strong></li> <li><strong>https://www.coinbase.com</strong></li> <li><strong>https://xchange.cc</strong></li> </ol> </div> <div align="left"> <h1><br> </h1> </div> <div align="left"> &#10004; Bitcoin adress for pay: 1F9WMAsdYPDaQuxx2F3t6vcJQw9KswFjsv <center> </center></br> &#10004; Send 1 BTC for decrypt <center> </center></br> &#10004; Send screenshot of payment to [email protected] or [email protected] - In letter include your personal ID (look at beginning of this document) <center> </center></br> <center>----------------------------------------------------------------------------- </center></br> <center> Attention!</center></br> <ul> <li> 1 BTC this is price for all PC/Servers in your corporate NetWork ! <li> Only our team can decrypt your files.</li> <li> No Payment = No decryption!</li> <li> You really get decryptor after payment. As a guarantee you can send 1 test image or text file to our email (In letter include your personal ID)</li> <li> Do not attempt to remove program or run any anti-virus tools! This doesn't help &#9786; </li> <li> Decoders of other users are not compatible with your data, because each user's have unique encryption key!!!</li> <li> Attempts of self-decrypting files will result in loss of your data </li> <center> </center></br> <center> </center></br> <center> </center></br> <center> &#169; 2018 Globeimposter 2.0 | All Rights Reserved.</center></br> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> �������������
Wallets

1F9WMAsdYPDaQuxx2F3t6vcJQw9KswFjsv

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe
    "C:\Users\Admin\AppData\Local\Temp\14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:4164
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3144
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3992
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:824
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
      PID:4308
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
      1⤵
        PID:4720
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 408 -p 824 -ip 824
        1⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Suspicious use of WriteProcessMemory
        PID:5092

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3144-130-0x000001A726D60000-0x000001A726D70000-memory.dmp

        Filesize

        64KB

      • memory/3144-131-0x000001A727320000-0x000001A727330000-memory.dmp

        Filesize

        64KB

      • memory/3144-132-0x000001A7299D0000-0x000001A7299D4000-memory.dmp

        Filesize

        16KB

      • memory/4308-142-0x0000021EC4990000-0x0000021EC4994000-memory.dmp

        Filesize

        16KB