Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 16:32
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
2.exe
-
Size
53KB
-
MD5
59e3542c4d5293a1a12b2bb6cb357d92
-
SHA1
f31322bc47eec5f5c7da0e46f23fb868c982daa1
-
SHA256
facc02c8d7a9927e3e1276f8122a2656136af1b8817511ed350b678b46407098
-
SHA512
85609e3598058b066af991bd8b665d4c9cda4e8b1de5429c20af354ee32fb29d7c3c1debcfcdd2fea760d1df29c3aaf3bc2d0e072601ed142661b9ef4313a939
Score
10/10
Malware Config
Extracted
Path
C:\how_to_back_files.html
Ransom Note
<html>
<style type="text/css">
body {
background-color: #f5f5f5;
}
h1, h3{
text-align: center;
text-transform: uppercase;
font-weight: normal;
}
/*---*/
.tabs1{
display: block;
margin: auto;
}
.tabs1 .head{
text-align: center;
float: top;
padding: 0px;
text-transform: uppercase;
font-weight: normal;
display: block;
background: #81bef7;
color: #DF0101;
font-size: 30px;
}
.tabs1 .identi {
font-size: 10px;
text-align: center;
float: top;
padding: 15px;
display: block;
background: #81bef7;
color: #DFDFDF;
}
.tabs .content {
background: #f5f5f5;
/*text-align: center;*/
color: #000000;
padding: 25px 15px;
font-size: 15px;
font-weight: 400;
line-height: 20px; }
.tabs .content a {
color: #df0130;
font-size: 23px;
font-style: italic;
text-decoration: none;
line-height: 35px; }
.tabs .content .text{
padding: 25px;
line-height: 1.2;
}
</style>
<body>
<div class="tabs1">
<div class="head" ><b>Your personal ID:</b></div>
<div class="identi">
<span style="width:1000px; color: #ffffff; font-size: 10px;">����������5E 4A D3 F9 F8 22 F8 93 6B 60 52 69 61 D3 6B 83
30 95 2B 0F 83 99 88 AA A7 4E 42 DD 7E 01 4F 87
61 D6 2F F8 06 7F A5 01 38 0A AA FC CB DA 9C FF
AF 6E DA 11 5A 93 44 62 B9 06 C6 3A A0 89 05 E9
8B F4 D9 CB 1A 28 82 5C 6E B0 1D A5 FA F9 0F 15
87 85 58 25 F4 35 A3 D3 58 4C 86 BA 13 7C 69 35
AD F4 2E 20 98 EC 60 E9 F6 ED B9 D0 92 2B 84 B4
B3 9D 67 87 31 F7 42 7D B9 FE 31 7B CF 0A 5A FC
42 C9 C7 21 BC 98 31 05 D0 87 03 5B AE 86 C0 F2
2F BF BB F6 E6 71 D7 ED 3E 42 00 B4 E6 FF B0 83
8F 33 51 B8 8C F7 54 08 A6 B5 98 93 B4 06 FD 96
63 C6 D9 6D AB FA 94 CD 29 72 E2 83 9E DD B4 71
EF 93 5B 48 56 88 23 4F B7 C8 A3 E3 C9 E7 7F 43
10 91 33 BD 91 84 14 49 2D D2 56 0D A1 8D 88 54
43 A4 8D B2 8C B0 9B 7F 36 E2 2D F3 99 90 9B 93
68 AB 9C 24 6F 23 1F 9C 9C E1 8C C2 C8 F7 5A B7
</span> <br>
<!-- !!! dont changing this !!! -->
</div>
</div>
<!-- -->
<div class="tabs">
<!--tab-->
<div class="tab">
<div id="tab-content1" class="content">
<div class="text">
<!--text data -->
<b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br>
<b>All your important files have been encrypted!</b><br><br>
<hr>
Your files are safe! Only modified. (RSA+AES)<br><br>
ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br>
WILL PERMANENTLY CORRUPT IT.<br>
DO NOT MODIFY ENCRYPTED FILES.<br>
DO NOT RENAME ENCRYPTED FILES.<br><br>
No software available on internet can help you. We are the only ones able to<br>
solve your problem.<br><br>
We gathered highly confidential/personal data. These data are currently stored on<br>
a private server. This server will be immediately destroyed after your payment.<br>
If you decide to not pay, we will release your data to public or re-seller.<br>
So you can expect your data to be publicly available in the near future..<br><br>
We only seek money and our goal is not to damage your reputation or prevent<br>
your business from running.<br><br>
You will can send us 2-3 non-important files and we will decrypt it for free<br>
to prove we are able to give your files back.<br><br>
<!--text data -->
<hr>
<b>Contact us for price and get decryption software.</b><br><br>
<a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br>
* Note that this server is available via Tor browser only<br><br>
Follow the instructions to open the link:<br>
1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br>
2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br>
3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br>
</a>
4. Start a chat and follow the further instructions. <br>
<hr>
<b>If you can not use the above link, use the email:</b><br>
<a href="[email protected] ">[email protected] </a> <br>
<a href="[email protected] ">[email protected] </a> <br>
<p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br>
<b>
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br>
</div>
</div>
</div>
<!--tab-->
<!--text data -->
</div>
</div>
<!--tab-->
</div>
</div>
</body>
</html>
Emails
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\StopTest.raw => C:\Users\Admin\Pictures\StopTest.raw.Nfucklock 2.exe File renamed C:\Users\Admin\Pictures\WaitPing.crw => C:\Users\Admin\Pictures\WaitPing.crw.Nfucklock 2.exe File opened for modification C:\Users\Admin\Pictures\InvokeJoin.tiff 2.exe File renamed C:\Users\Admin\Pictures\InvokeJoin.tiff => C:\Users\Admin\Pictures\InvokeJoin.tiff.Nfucklock 2.exe File opened for modification C:\Users\Admin\Pictures\MoveBlock.tiff 2.exe File renamed C:\Users\Admin\Pictures\MoveBlock.tiff => C:\Users\Admin\Pictures\MoveBlock.tiff.Nfucklock 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\2.exe" 2.exe