Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    05-03-2022 20:40

General

  • Target

    f373ca7e899cce69865c55be5a583aff18459489748ec55649e884d4be5ba434.exe

  • Size

    53KB

  • MD5

    c023089bc9f12e45e974688429188350

  • SHA1

    4178affe4951ae1c9f98adb9891432c5bc8a9d50

  • SHA256

    f373ca7e899cce69865c55be5a583aff18459489748ec55649e884d4be5ba434

  • SHA512

    554ceb05fa40a6f51ea98cb786f83d0cbea55af770e333f78fef597be63d7840626eab8ccd8ca9494d409a242643843d67b87cfabccecfc2ea82195614892bee

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>���������������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your files are encrypted! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> To recover data you need decryptor.</br> To get the decryptor you should:</br> <p>Send 1 test image or text file <span>[email protected] </span>.</br> In the letter include your personal ID (look at the beginning of this document).</p> We will give you the decrypted file and assign the price for decryption all files</p> After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions We can decrypt one file in quality the evidence that we have the decoder.</br> <center>Attention!</center></br> <ul> <li>Only [email protected] can decrypt your files</li> <li>Do not trust [email protected]</li> <li>Do not attempt to remove the program or run the anti-virus tools</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ��������

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f373ca7e899cce69865c55be5a583aff18459489748ec55649e884d4be5ba434.exe
    "C:\Users\Admin\AppData\Local\Temp\f373ca7e899cce69865c55be5a583aff18459489748ec55649e884d4be5ba434.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads