Analysis

  • max time kernel
    149s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-06-2022 03:56

General

  • Target

    2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe

  • Size

    261KB

  • MD5

    860b89a4138f744adbe41cee1de0848f

  • SHA1

    6367510a18f07252168ebdd7029f0e6cde919b8c

  • SHA256

    2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88

  • SHA512

    ed651840d87f8f5a79e2c9b57ae20f8d9e76dc14479cbbebd6f51b3f1ee95ecce70f791172f89c1d606a483c1f26bb247ade535d33e92211094931c80292ee2d

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://alcx6zctcmhmn3kx.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELO ###s6dlsnhtjwbhr###ED56F6A208E3EB2###
URLs

http://alcx6zctcmhmn3kx.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 5 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe
    "C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1912
    • C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe
      "C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4728
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /f /im sql* & taskkill /f /im backup* & taskkill /f /im MSExchange* & taskkill /f /im Microsoft.Exchange.* & taskkill /f /im mysql* & vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im sql*
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:260
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im backup*
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1824
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im MSExchange*
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1952
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im Microsoft.Exchange.*
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1932
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im mysql*
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:924
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4856
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2696
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2636
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4892
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:4520
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2020
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3568
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1360
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4548

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe.log

      Filesize

      1008B

      MD5

      48497b2121b393b389626441c9c8a2dc

      SHA1

      ee56247723ae1d5393ba5de0774ba9215ca80f96

      SHA256

      570f18ef08f5ae4a5c160809f3de9835a9a417ba5fd337fefc7773a48d39911d

      SHA512

      e95066be559113e958cc5b11432791fee180d620acd32afbf3578dfeb1071f483f6b2c58df9df052f756e511bd8e459f199ec68f481275bf7fe2df86778f6821

    • C:\Users\Admin\AppData\Local\Temp\2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88.exe

      Filesize

      261KB

      MD5

      860b89a4138f744adbe41cee1de0848f

      SHA1

      6367510a18f07252168ebdd7029f0e6cde919b8c

      SHA256

      2aee7ed6cc10cf7e0c86c166586c400c8dab691924d3ef69b1c612ef570bcb88

      SHA512

      ed651840d87f8f5a79e2c9b57ae20f8d9e76dc14479cbbebd6f51b3f1ee95ecce70f791172f89c1d606a483c1f26bb247ade535d33e92211094931c80292ee2d

    • memory/4472-135-0x00000000063D0000-0x0000000006592000-memory.dmp

      Filesize

      1.8MB

    • memory/4472-130-0x0000000000DF0000-0x0000000000E34000-memory.dmp

      Filesize

      272KB

    • memory/4472-131-0x0000000005750000-0x0000000005772000-memory.dmp

      Filesize

      136KB

    • memory/4472-138-0x0000000001530000-0x00000000015CC000-memory.dmp

      Filesize

      624KB

    • memory/4472-134-0x0000000006780000-0x0000000006D24000-memory.dmp

      Filesize

      5.6MB

    • memory/4472-133-0x0000000006160000-0x00000000061C6000-memory.dmp

      Filesize

      408KB

    • memory/4472-137-0x00000000062B0000-0x0000000006342000-memory.dmp

      Filesize

      584KB

    • memory/4728-143-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4728-140-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4728-144-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB