Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 03:28

General

  • Target

    173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca.exe

  • Size

    514KB

  • MD5

    333692f4aa893a0f1c2f5e0fb6b23737

  • SHA1

    5a951cf930941b88bf4dd250f37f178c4f94c5c1

  • SHA256

    173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca

  • SHA512

    5492f23abf615f62f7b1a43aef1713bb55ecc72d8aa9a0399d97b0f24f116bbf237962de894e9a014a7a13795843d8c1d42b599c89955fd5309270751284d631

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������23 F7 AC E1 9A 4B 3F 88 31 26 5D A1 88 E8 AB 96 2B 38 F9 8C 66 04 BD B3 26 5C 60 ED F5 12 53 8C EA EF 09 8A 76 22 2B 4E CF F9 DD A7 D9 45 3E 99 D1 F5 18 3F D2 69 00 8F FB E6 BD 68 73 53 07 69 D3 AB 34 E6 E2 FC 6A 70 06 81 B2 0D 9A E0 68 39 84 FE 97 39 51 FF F8 19 9D 92 B6 F8 FF 44 EC EA F7 A7 18 0F E2 46 71 B7 80 22 EA 45 3C 2A AC 65 06 CD 19 1B D6 B5 31 9D 93 50 E0 20 63 2D 2A 80 69 B2 AD A3 FD 8A 57 59 33 2A 52 46 27 87 AA DA 44 7E 59 F4 79 82 F1 CA E4 FA 26 0B DC 80 17 07 1F 32 22 8C 3B F4 09 69 8D 8E 6E 24 68 E8 0D CC AC 71 46 DE FE 64 5A F2 C8 D8 63 D7 B6 B8 CD DB 8F E5 5D 8D 8A B0 1B AE 4B 11 B3 3F 00 64 1E E8 D0 5A 8A 7A DF 46 1B 3A E6 15 3B 62 C7 D2 CD 9C B6 50 E9 E5 F2 8D 38 FE D3 BB C0 3D 54 69 D7 B6 56 B5 7E CD A4 18 34 85 EB 8A 68 DD 42 64 FD 46 ###�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 28 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca.exe
    "C:\Users\Admin\AppData\Local\Temp\173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca.exe
      "C:\Users\Admin\AppData\Local\Temp\173515afd6301b429f9dab54894aeaf1285e59d25c0a9795eb352b8693c902ca.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/888-57-0x0000000000400000-0x000000000040D600-memory.dmp

    Filesize

    53KB

  • memory/1672-54-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB