Analysis

  • max time kernel
    173s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    31-05-2022 05:54

General

  • Target

    067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe

  • Size

    267KB

  • MD5

    7d67bbf0d095476eab63758fdc87fc59

  • SHA1

    34adeff5d484e149ba5bcb6e24475c53fa2ae332

  • SHA256

    067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3

  • SHA512

    b897fb073d25fd5dd052cf5733c40062d2c39649ce20d800ecbd1005f9d86e296c7e1a3455fc4251d24f2e9f45294b9a082ba28d9fbf410e9614c7bc514c7f84

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������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�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe
    "C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1940
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2000
    • C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe
      "C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • NTFS ADS
      PID:1296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe

    Filesize

    267KB

    MD5

    7d67bbf0d095476eab63758fdc87fc59

    SHA1

    34adeff5d484e149ba5bcb6e24475c53fa2ae332

    SHA256

    067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3

    SHA512

    b897fb073d25fd5dd052cf5733c40062d2c39649ce20d800ecbd1005f9d86e296c7e1a3455fc4251d24f2e9f45294b9a082ba28d9fbf410e9614c7bc514c7f84

  • \Users\Admin\AppData\Local\Temp\067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3.exe

    Filesize

    267KB

    MD5

    7d67bbf0d095476eab63758fdc87fc59

    SHA1

    34adeff5d484e149ba5bcb6e24475c53fa2ae332

    SHA256

    067c2cfa9e227c4fe191b6dbd936120f8acd48efeb767429d13960137dfb60b3

    SHA512

    b897fb073d25fd5dd052cf5733c40062d2c39649ce20d800ecbd1005f9d86e296c7e1a3455fc4251d24f2e9f45294b9a082ba28d9fbf410e9614c7bc514c7f84

  • memory/1296-89-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1296-86-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1296-82-0x0000000000409F20-mapping.dmp

  • memory/1296-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1296-79-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1296-78-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1664-62-0x00000000715A0000-0x0000000071D80000-memory.dmp

    Filesize

    7.9MB

  • memory/1664-75-0x0000000002020000-0x000000000202C000-memory.dmp

    Filesize

    48KB

  • memory/1664-64-0x0000000070840000-0x0000000071596000-memory.dmp

    Filesize

    13.3MB

  • memory/1664-55-0x0000000072790000-0x0000000073B1F000-memory.dmp

    Filesize

    19.6MB

  • memory/1664-66-0x0000000000680000-0x000000000068C000-memory.dmp

    Filesize

    48KB

  • memory/1664-67-0x0000000000A40000-0x0000000000A46000-memory.dmp

    Filesize

    24KB

  • memory/1664-68-0x0000000070520000-0x000000007083B000-memory.dmp

    Filesize

    3.1MB

  • memory/1664-69-0x0000000073FB0000-0x0000000073FEB000-memory.dmp

    Filesize

    236KB

  • memory/1664-70-0x0000000073E10000-0x0000000073FA4000-memory.dmp

    Filesize

    1.6MB

  • memory/1664-71-0x000000006F800000-0x000000007051D000-memory.dmp

    Filesize

    13.1MB

  • memory/1664-72-0x0000000071D80000-0x0000000072790000-memory.dmp

    Filesize

    10.1MB

  • memory/1664-73-0x00000000715A0000-0x0000000071D80000-memory.dmp

    Filesize

    7.9MB

  • memory/1664-74-0x0000000070840000-0x0000000071596000-memory.dmp

    Filesize

    13.3MB

  • memory/1664-63-0x0000000074010000-0x0000000074133000-memory.dmp

    Filesize

    1.1MB

  • memory/1664-76-0x000000006F360000-0x000000006F531000-memory.dmp

    Filesize

    1.8MB

  • memory/1664-54-0x0000000000A90000-0x0000000000AD8000-memory.dmp

    Filesize

    288KB

  • memory/1664-61-0x0000000000590000-0x000000000059A000-memory.dmp

    Filesize

    40KB

  • memory/1664-88-0x0000000073E10000-0x0000000073FA4000-memory.dmp

    Filesize

    1.6MB

  • memory/1664-59-0x0000000075581000-0x0000000075583000-memory.dmp

    Filesize

    8KB

  • memory/1664-58-0x0000000071D80000-0x0000000072790000-memory.dmp

    Filesize

    10.1MB

  • memory/1664-57-0x0000000072790000-0x0000000073B1F000-memory.dmp

    Filesize

    19.6MB

  • memory/1664-56-0x0000000000320000-0x000000000034A000-memory.dmp

    Filesize

    168KB

  • memory/1664-87-0x0000000072790000-0x0000000073B1F000-memory.dmp

    Filesize

    19.6MB

  • memory/1940-60-0x0000000000000000-mapping.dmp

  • memory/2000-65-0x0000000000000000-mapping.dmp