Analysis
-
max time kernel
157s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
10-05-2022 06:01
Static task
static1
Behavioral task
behavioral1
Sample
star.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
star.exe
Resource
win10v2004-20220414-en
General
-
Target
star.exe
-
Size
360KB
-
MD5
2f121145ea11b36f9ade0cb8f319e40a
-
SHA1
d68049989ce98f71f6a562e439f6b6f0a165f003
-
SHA256
59e0ab333060b4e510db5d36d87f0fe267ab66b0881955649b06d91d6dd2d486
-
SHA512
9211a74cfa23c70c6ace8bd168ecbe1bb4a06d2e03b5adff5546115137b6ce849d3e41337581123d48e5082319f507d8f2d274621317fada182530e4a0abb6c7
Malware Config
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RepairMeasure.tif => C:\Users\Admin\Pictures\RepairMeasure.tif.xls star.exe File renamed C:\Users\Admin\Pictures\UnpublishConvertTo.tif => C:\Users\Admin\Pictures\UnpublishConvertTo.tif.xls star.exe File renamed C:\Users\Admin\Pictures\MountUnblock.tif => C:\Users\Admin\Pictures\MountUnblock.tif.xls star.exe File renamed C:\Users\Admin\Pictures\PingRead.crw => C:\Users\Admin\Pictures\PingRead.crw.xls star.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation star.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\star.exe" star.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce star.exe -
Drops desktop.ini file(s) 24 IoCs
description ioc Process File opened for modification C:\Users\Admin\OneDrive\desktop.ini star.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini star.exe File opened for modification C:\Users\Public\desktop.ini star.exe File opened for modification C:\Users\Public\Downloads\desktop.ini star.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini star.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini star.exe File opened for modification C:\Users\Public\Videos\desktop.ini star.exe File opened for modification C:\Users\Public\Documents\desktop.ini star.exe File opened for modification C:\Users\Admin\Music\desktop.ini star.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini star.exe File opened for modification C:\Users\Admin\Links\desktop.ini star.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini star.exe File opened for modification C:\Users\Admin\Documents\desktop.ini star.exe File opened for modification C:\Users\Public\Pictures\desktop.ini star.exe File opened for modification C:\Users\Public\Desktop\desktop.ini star.exe File opened for modification C:\Users\Admin\Searches\desktop.ini star.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini star.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini star.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini star.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini star.exe File opened for modification C:\Users\Public\Music\desktop.ini star.exe File opened for modification C:\Users\Public\Libraries\desktop.ini star.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini star.exe File opened for modification C:\Users\Admin\Videos\desktop.ini star.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 4764 2344 star.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1544 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1544 2344 star.exe 99 PID 2344 wrote to memory of 1544 2344 star.exe 99 PID 2344 wrote to memory of 1544 2344 star.exe 99 PID 2344 wrote to memory of 4764 2344 star.exe 101 PID 2344 wrote to memory of 4764 2344 star.exe 101 PID 2344 wrote to memory of 4764 2344 star.exe 101 PID 2344 wrote to memory of 4764 2344 star.exe 101 PID 2344 wrote to memory of 4764 2344 star.exe 101 PID 2344 wrote to memory of 4764 2344 star.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\star.exe"C:\Users\Admin\AppData\Local\Temp\star.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVYbanglCI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE55F.tmp"2⤵
- Creates scheduled task(s)
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\star.exe"{path}"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:4764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5243998c586e102d5706d22e1ccdb5781
SHA1a8326b85c94e9f68b6a92c45551933fb5d5fdb52
SHA2564bcf513eb854417da91582ebb18b08b740bddb3fb6973f3693cbcf65c76b4331
SHA512720376589d9dcd21c138f4725b66a8b604b3d6691c61c3c980cc0cead4184da328906e669497276caee719363cdf09c19d11c4a4729983a7a632c817c0ab642d
-
Filesize
360KB
MD557b076b700553392d4b27b8aec82086b
SHA1916044c79d0f3db65bc4732877dee3e5dbfeaae2
SHA2569ff43e411d773083b87f5f5814bf3497b5792e508c0fbede15f7231d2c3692c7
SHA5125dd8744ea9710f533fc05512bd73c7dd8e5b47df96143724cd85acee6e0d4b4e2ab1baf3a00344195686b996e4c7351c64b97c487dc8aed005273b511f298ce9