Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-05-2022 05:46
Static task
static1
Behavioral task
behavioral1
Sample
star.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
star.exe
Resource
win10v2004-20220414-en
General
-
Target
star.exe
-
Size
360KB
-
MD5
2f121145ea11b36f9ade0cb8f319e40a
-
SHA1
d68049989ce98f71f6a562e439f6b6f0a165f003
-
SHA256
59e0ab333060b4e510db5d36d87f0fe267ab66b0881955649b06d91d6dd2d486
-
SHA512
9211a74cfa23c70c6ace8bd168ecbe1bb4a06d2e03b5adff5546115137b6ce849d3e41337581123d48e5082319f507d8f2d274621317fada182530e4a0abb6c7
Malware Config
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResumeApprove.png => C:\Users\Admin\Pictures\ResumeApprove.png.xls star.exe File renamed C:\Users\Admin\Pictures\ResumeDisable.png => C:\Users\Admin\Pictures\ResumeDisable.png.xls star.exe File renamed C:\Users\Admin\Pictures\SaveSplit.png => C:\Users\Admin\Pictures\SaveSplit.png.xls star.exe File renamed C:\Users\Admin\Pictures\SkipDeny.crw => C:\Users\Admin\Pictures\SkipDeny.crw.xls star.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce star.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\star.exe" star.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Admin\Favorites\desktop.ini star.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini star.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini star.exe File opened for modification C:\Users\Public\Libraries\desktop.ini star.exe File opened for modification C:\Users\Public\Desktop\desktop.ini star.exe File opened for modification C:\Users\Admin\Searches\desktop.ini star.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini star.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini star.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini star.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini star.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini star.exe File opened for modification C:\Users\Public\Downloads\desktop.ini star.exe File opened for modification C:\Users\Admin\Links\desktop.ini star.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini star.exe File opened for modification C:\Users\Public\desktop.ini star.exe File opened for modification C:\Users\Public\Music\desktop.ini star.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini star.exe File opened for modification C:\Users\Admin\Music\desktop.ini star.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini star.exe File opened for modification C:\Users\Public\Documents\desktop.ini star.exe File opened for modification C:\Users\Admin\Videos\desktop.ini star.exe File opened for modification C:\Users\Admin\Documents\desktop.ini star.exe File opened for modification C:\Users\Public\Videos\desktop.ini star.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini star.exe File opened for modification C:\Users\Public\Pictures\desktop.ini star.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini star.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 816 1580 star.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2020 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2020 1580 star.exe 27 PID 1580 wrote to memory of 2020 1580 star.exe 27 PID 1580 wrote to memory of 2020 1580 star.exe 27 PID 1580 wrote to memory of 2020 1580 star.exe 27 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29 PID 1580 wrote to memory of 816 1580 star.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\star.exe"C:\Users\Admin\AppData\Local\Temp\star.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVYbanglCI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB52D.tmp"2⤵
- Creates scheduled task(s)
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\star.exe"{path}"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5efef11175efa67cf47fdfc5d674fc3ba
SHA184b712204ffb9f24ef7953707986d80ef57e4001
SHA25652b0fa5fd3c4263bb136cec86f505c8127876fb65f4a3c9d0463d9bf7f05a707
SHA512279dbdddaf5aeb2b37a33adb69a30d3f301699fa83162d943b5d548fb28d93037c195bb3b0506e90dc81a05bada14215cb3cb86d6077d153192d4bdc7d6d0c38
-
Filesize
360KB
MD5df412d2fb14ddf0f111e836139170776
SHA1c489a70161c6fa3cfe71921af372da3fbb10b2f1
SHA25691fc6bd619163d74ea7861ddb3536b67d8d75fe3405a5ad899bb9002008771da
SHA512751630fcb94df060b21141b7daafe585fb2eb3601b2bd00f4c5f75b430ac5ccd979bc2f332ec74fff52eb8dd5e11a91ed619d947632a0ec8562779c7ebe4a1d1