Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe
Resource
win10v2004-20220414-en
General
-
Target
935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe
-
Size
409KB
-
MD5
ca5f6009311c61f27ad3be2914b9fc59
-
SHA1
d20a8fef26ee4d833ee81c2bd6aaa8a06f322562
-
SHA256
935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c
-
SHA512
4823125186d614a40b5356b042ea893a71be12930e5b5f454a6fb0b99ba90cf00f29919fe9ac9f9f793ae7a51cf8a2334a31727e14bbfdb393566ad3023eabfa
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Executes dropped EXE 2 IoCs
pid Process 1552 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 3436 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EnableFormat.tiff => C:\Users\Admin\Pictures\EnableFormat.tiff.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\MoveTrace.tif => C:\Users\Admin\Pictures\MoveTrace.tif.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\RestoreTrace.png => C:\Users\Admin\Pictures\RestoreTrace.png.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\SendUse.raw => C:\Users\Admin\Pictures\SendUse.raw.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\StopProtect.png => C:\Users\Admin\Pictures\StopProtect.png.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Pictures\EnableFormat.tiff 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\LimitRestore.png => C:\Users\Admin\Pictures\LimitRestore.png.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\RevokeMove.raw => C:\Users\Admin\Pictures\RevokeMove.raw.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File renamed C:\Users\Admin\Pictures\SplitUnlock.png => C:\Users\Admin\Pictures\SplitUnlock.png.DOCM 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe" 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Drops desktop.ini file(s) 24 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Music\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Links\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Videos\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Documents\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Music\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe\:Zone.Identifier:$DATA 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe File created C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2712 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 91 PID 2192 wrote to memory of 2712 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 91 PID 2192 wrote to memory of 2712 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 91 PID 2192 wrote to memory of 4708 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 93 PID 2192 wrote to memory of 4708 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 93 PID 2192 wrote to memory of 4708 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 93 PID 2192 wrote to memory of 1552 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 100 PID 2192 wrote to memory of 1552 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 100 PID 2192 wrote to memory of 1552 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 100 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101 PID 2192 wrote to memory of 3436 2192 935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- NTFS ADS
PID:3436
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe
Filesize409KB
MD5ca5f6009311c61f27ad3be2914b9fc59
SHA1d20a8fef26ee4d833ee81c2bd6aaa8a06f322562
SHA256935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c
SHA5124823125186d614a40b5356b042ea893a71be12930e5b5f454a6fb0b99ba90cf00f29919fe9ac9f9f793ae7a51cf8a2334a31727e14bbfdb393566ad3023eabfa
-
C:\Users\Admin\AppData\Local\Temp\935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c.exe
Filesize409KB
MD5ca5f6009311c61f27ad3be2914b9fc59
SHA1d20a8fef26ee4d833ee81c2bd6aaa8a06f322562
SHA256935618441af5a6a841621b34a836050eddbfd8a8b09aaf5effb917e6c1804f3c
SHA5124823125186d614a40b5356b042ea893a71be12930e5b5f454a6fb0b99ba90cf00f29919fe9ac9f9f793ae7a51cf8a2334a31727e14bbfdb393566ad3023eabfa