Analysis

  • max time kernel
    157s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    30-05-2022 20:15

General

  • Target

    08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe

  • Size

    270KB

  • MD5

    b44f00cb1edb37de99b3433e1923690f

  • SHA1

    214e0da093d49cfc4ff6c34515767dc079daaeed

  • SHA256

    08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517

  • SHA512

    529c279d2cf5ab854adf02d47924fa351a21c58a912323b164da4c3840a52376ef74a4b021fcf610794b3b1d99b3775365d21041404038bc3ca1101e6b0641c8

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������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�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 20 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe
    "C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3536
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1448
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2640
    • C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe
      "C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • NTFS ADS
      PID:3544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517.exe

    Filesize

    270KB

    MD5

    b44f00cb1edb37de99b3433e1923690f

    SHA1

    214e0da093d49cfc4ff6c34515767dc079daaeed

    SHA256

    08f7c2a8b124972c88f685d28e19b7a4dfdf63a4d2aabf3bb2672900d11fd517

    SHA512

    529c279d2cf5ab854adf02d47924fa351a21c58a912323b164da4c3840a52376ef74a4b021fcf610794b3b1d99b3775365d21041404038bc3ca1101e6b0641c8

  • memory/3536-133-0x0000000006C00000-0x0000000006C66000-memory.dmp

    Filesize

    408KB

  • memory/3536-134-0x0000000006BC0000-0x0000000006BE2000-memory.dmp

    Filesize

    136KB

  • memory/3536-135-0x0000000007220000-0x00000000077C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3536-130-0x0000000000DD0000-0x0000000000E18000-memory.dmp

    Filesize

    288KB

  • memory/3536-137-0x0000000006D50000-0x0000000006DE2000-memory.dmp

    Filesize

    584KB

  • memory/3536-138-0x00000000016D0000-0x000000000176C000-memory.dmp

    Filesize

    624KB

  • memory/3536-131-0x00000000067C0000-0x0000000006982000-memory.dmp

    Filesize

    1.8MB

  • memory/3544-140-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3544-143-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3544-144-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB