Analysis
-
max time kernel
184s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-05-2022 04:25
Static task
static1
Behavioral task
behavioral1
Sample
star.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
star.exe
Resource
win10v2004-20220414-en
General
-
Target
star.exe
-
Size
360KB
-
MD5
2f121145ea11b36f9ade0cb8f319e40a
-
SHA1
d68049989ce98f71f6a562e439f6b6f0a165f003
-
SHA256
59e0ab333060b4e510db5d36d87f0fe267ab66b0881955649b06d91d6dd2d486
-
SHA512
9211a74cfa23c70c6ace8bd168ecbe1bb4a06d2e03b5adff5546115137b6ce849d3e41337581123d48e5082319f507d8f2d274621317fada182530e4a0abb6c7
Malware Config
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation star.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce star.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\star.exe" star.exe -
Drops desktop.ini file(s) 9 IoCs
description ioc Process File opened for modification C:\Users\Public\Videos\desktop.ini star.exe File opened for modification C:\Users\Public\Pictures\desktop.ini star.exe File opened for modification C:\Users\Public\Music\desktop.ini star.exe File opened for modification C:\Users\Public\Downloads\desktop.ini star.exe File opened for modification C:\Users\Public\Desktop\desktop.ini star.exe File opened for modification C:\Users\Public\desktop.ini star.exe File opened for modification C:\Users\Public\Libraries\desktop.ini star.exe File opened for modification C:\Users\Public\Documents\desktop.ini star.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini star.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 3832 1832 star.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1232 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1232 1832 star.exe 86 PID 1832 wrote to memory of 1232 1832 star.exe 86 PID 1832 wrote to memory of 1232 1832 star.exe 86 PID 1832 wrote to memory of 3832 1832 star.exe 89 PID 1832 wrote to memory of 3832 1832 star.exe 89 PID 1832 wrote to memory of 3832 1832 star.exe 89 PID 1832 wrote to memory of 3832 1832 star.exe 89 PID 1832 wrote to memory of 3832 1832 star.exe 89 PID 1832 wrote to memory of 3832 1832 star.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\star.exe"C:\Users\Admin\AppData\Local\Temp\star.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVYbanglCI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA345.tmp"2⤵
- Creates scheduled task(s)
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\star.exe"{path}"2⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:3832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a140b0e5062c89d008506078cc40d719
SHA14cb33bbf1e51c83d8f2a41609d9b8f7fdfd586c4
SHA25664bedecbca9b6ade27a038f019ab74b887018e95c1af10d0c78f64930bf557b4
SHA512fbd8b9358611c6c3a1c2f7dd8869507e99444d534f81b7115b9a66b5782e8500416415d665b51c153dc49202c23cf007a43dd7266534eb8f86c34307d72be8df