Analysis

  • max time kernel
    159s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-05-2022 02:17

General

  • Target

    star.exe

  • Size

    360KB

  • MD5

    2f121145ea11b36f9ade0cb8f319e40a

  • SHA1

    d68049989ce98f71f6a562e439f6b6f0a165f003

  • SHA256

    59e0ab333060b4e510db5d36d87f0fe267ab66b0881955649b06d91d6dd2d486

  • SHA512

    9211a74cfa23c70c6ace8bd168ecbe1bb4a06d2e03b5adff5546115137b6ce849d3e41337581123d48e5082319f507d8f2d274621317fada182530e4a0abb6c7

Malware Config

Extracted

Path

C:\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 24 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\star.exe
    "C:\Users\Admin\AppData\Local\Temp\star.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVYbanglCI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDE89.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3016
    • C:\Users\Admin\AppData\Local\Temp\star.exe
      "{path}"
      2⤵
        PID:1076
      • C:\Users\Admin\AppData\Local\Temp\star.exe
        "{path}"
        2⤵
        • Modifies extensions of user files
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        PID:1920

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpDE89.tmp

      Filesize

      1KB

      MD5

      243998c586e102d5706d22e1ccdb5781

      SHA1

      a8326b85c94e9f68b6a92c45551933fb5d5fdb52

      SHA256

      4bcf513eb854417da91582ebb18b08b740bddb3fb6973f3693cbcf65c76b4331

      SHA512

      720376589d9dcd21c138f4725b66a8b604b3d6691c61c3c980cc0cead4184da328906e669497276caee719363cdf09c19d11c4a4729983a7a632c817c0ab642d

    • C:\Users\Admin\AppData\Roaming\jVYbanglCI.exe

      Filesize

      360KB

      MD5

      09dbea5dd7daa3bcb4318e5c2ab91f7c

      SHA1

      9dc5488b07ff8bd58d5ab292ab39c91b88a7d82b

      SHA256

      217b6fc0f7b5f8c4956c5f7f6c30035923ce6c388be625e6b9aebba509d576f2

      SHA512

      046dbe140ec99e1e11f39596a4608d266153c586426f2a0a32d7e5f9ea81191706db3c486939e86b9002fef16b81d104be70bd31f5a5c706a24d96adaba2c924

    • memory/1920-143-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1920-142-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1920-140-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4880-130-0x0000000000E30000-0x0000000000E90000-memory.dmp

      Filesize

      384KB

    • memory/4880-135-0x0000000005A20000-0x0000000005A76000-memory.dmp

      Filesize

      344KB

    • memory/4880-134-0x00000000058C0000-0x00000000058CA000-memory.dmp

      Filesize

      40KB

    • memory/4880-133-0x0000000005920000-0x00000000059B2000-memory.dmp

      Filesize

      584KB

    • memory/4880-132-0x0000000005ED0000-0x0000000006474000-memory.dmp

      Filesize

      5.6MB

    • memory/4880-131-0x00000000057D0000-0x000000000586C000-memory.dmp

      Filesize

      624KB