Analysis

  • max time kernel
    151s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-06-2022 17:43

General

  • Target

    28644496493462629e22aeebb030e2536dbdaccdaee4dd782106f3b5099e897e.exe

  • Size

    106KB

  • MD5

    0734b966a27e64eaeff718b18e469f6e

  • SHA1

    8214a6f9ac0c5c4ad4830b6829f2811a2dcfefe0

  • SHA256

    28644496493462629e22aeebb030e2536dbdaccdaee4dd782106f3b5099e897e

  • SHA512

    8a8c46890516e3e34be1de04a24720af96c217c472e133568b7220a191bab5560a9008aeb3d2c9239634295896ef237502c92cbe1fcfc51c76ce0adfbe73e063

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://alcx6zctcmhmn3kx.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 2 file for free decryption. ------------------------------------------------------------ alternate address - http://dtutgqjuzv7sktgl.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������42 46 D2 42 DC 63 44 82 EA 28 DB 1A F5 3D 17 58 24 5C 0A A5 F9 93 98 F1 BF 90 A6 E4 2C 02 F6 DB 4E FA C4 D9 78 0C A7 51 F5 5E 2E A0 AC 4F 43 B4 EA DA 1B 61 51 5D 30 CE 18 8E 2C 4A 05 9A 06 E4 BE F0 03 A5 53 FF B8 77 B9 08 C3 B9 94 CB BF 05 85 9A 98 0A AE 1F FC 82 C3 94 A1 9C 41 E2 78 A8 66 D9 ED 0E D8 AB 6E 69 C8 56 EA 9B 6F 32 68 4C 24 F0 16 10 96 5E 92 05 DD 73 95 BB 46 28 35 61 71 4E 57 2B EA E5 FB 68 C7 56 40 54 80 3E 69 A7 B8 B8 4C 28 69 2B 77 B8 F1 33 58 B4 EB 4B E5 8D 9E 72 32 9E 8F 1F 5E 05 D6 9E 0C A5 90 3D DA 78 F2 58 D8 A7 10 22 6D D1 45 5F 25 91 82 22 EC D2 E2 C3 DC 0C 04 DB B7 04 16 9C 48 7D 60 2E 05 29 BE E5 67 3D BC 0F 5D 49 16 86 BC E4 DF 89 9D E9 93 86 29 3C AF 86 D7 31 14 B2 06 26 35 51 8D E9 2B 7A BD 8E 91 E2 A9 D0 38 38 D2 BA E7 0C 87 EE ###�������������
URLs

http://alcx6zctcmhmn3kx.onion/

http://dtutgqjuzv7sktgl.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28644496493462629e22aeebb030e2536dbdaccdaee4dd782106f3b5099e897e.exe
    "C:\Users\Admin\AppData\Local\Temp\28644496493462629e22aeebb030e2536dbdaccdaee4dd782106f3b5099e897e.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1472-54-0x0000000074F21000-0x0000000074F23000-memory.dmp

    Filesize

    8KB

  • memory/1472-55-0x00000000003C0000-0x00000000003D3000-memory.dmp

    Filesize

    76KB

  • memory/1472-56-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1472-57-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB