Analysis

  • max time kernel
    170s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 19:14

General

  • Target

    54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68.exe

  • Size

    319KB

  • MD5

    1ffeea615ff185601b81abbcec9b16ca

  • SHA1

    8f507aa4a570c503c9b3510169c2f815ef19cb0d

  • SHA256

    54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68

  • SHA512

    9903aa10e7d49a1a813d486a3647f2b4fc4fb4cc0e06906c77160a656a3fdee242a14252bf46b4574a10e4b4c0bb1b6bfd3479d7f1311299a3e78fd289fdfeb4

Malware Config

Extracted

Path

C:\how_to_back_files.html

Ransom Note
<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <!--[if lt IE 9]><script src="https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"></script><![endif]--> <title>How to open your files</title> <style> * { margin: 0; padding: 0; box-sizing: border-box; -moz-box-sizing: border-box; -webkit-box-sizing: border-box; } footer, main { display: block; } body { font: 15px/18px Arial, sans-serif; width: 100%; background: #f1f1f1; color: #333; } .inner { width: 100%; max-width: 1000px; margin: 0 auto; padding: 30px 10px; } .content, .footer { line-height: 1.5; } .center { text-align: center; } .title { font-size: 22px; font-weight: bold; margin-bottom: 20px; color: #ff2a22; } .content .inner { background: #f1f1f1; padding: 30px; margin: 30px auto 0; } .red { font-weight: bold; color: #ff0000; } .content p { margin-bottom: 13px; } .content p:last-child { margin-bottom: 0; } .email { color: #0066ff; font-style: italic; } ul { margin-left: 30px; } .footer .inner { padding: 30px; margin: 0 auto; border: 6px solid #cccccc; background: #d9d9d9; } .footer .title { font-size: 18px; margin-bottom: 15px; } .footer { padding: 0 30px 30px; color: #333; font-size: 13px; } .id { color: #333; font-size: 10px; } </style> </head> <body> <main class="content"> <div class="inner"> <div class="title center">All your data has been ciphered!</div> <p>The only way of recovering your files is to buy a unique decryptor. <br> A decryptor is fully automatical, all your data will be recovered within a few hours after it’s installation.</p> <p>For purchasing a decryptor contact us by email:<br> <span class="email">[email protected]</span></p> <p>If you will get no answer within 24 hours contact us by our alternate emails:<br> <span class="email">[email protected]</span><br> <span class="email"></span></p> <p>We assure full recovery after the payment. <br> To verify the possibility of the recovery of your files we can decipher 1 file for free. <br> Attach 1 file to the letter (no more than 5Mb). Indicate <span class="red">your personal ID</span> on the letter:<br> <span class="id"> ����������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span> </p> <p>In reply we will send you an deciphered file and an instruction for purchasing an automatical decryptor for all your files. After the payment we will send you a decryptor and an instructions for protecting your computer from network vulnerabilities..</p> </div> </main><!-- .content --> <footer class="footer"> <div class="inner"> <div class="title center">Attention!</div> <ul> <li>Only <span class="email">[email protected]</span>, <span class="email">[email protected]</span> <span class="email"></span> can decipher all your files.</li> <li>Launching of antivirus programs will not help.</li> <li>Changing ciphered files will result in a loose of data.</li> <li>Attempts of deciphering by yourself will result in a loose of data.</li> <li>Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.</li> </ul> </div> </footer><!-- .footer --> </body> </html>��������
Emails

class="email">[email protected]</span></p>

class="email">[email protected]</span><br>

class="email">[email protected]</span>

class="email">[email protected]</span>

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68.exe
    "C:\Users\Admin\AppData\Local\Temp\54756423eddeb6bfca2a15d676956e4bff2c9e7577265d55cd0224e924521c68.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1952-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB

  • memory/1952-56-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1952-55-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1952-57-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1952-58-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB