Analysis
-
max time kernel
152s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31/07/2022, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win7-20220715-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
csrss.exe
Resource
win10v2004-20220721-en
5 signatures
150 seconds
General
-
Target
csrss.exe
-
Size
55KB
-
MD5
97de24939a69d700be5efbfa388b32ca
-
SHA1
10fb3bb9a8060069770272dacb96a3756a536807
-
SHA256
6455f22ea582d86f85a968a6623cbb53bd81f1ad0dd22c98f62a07e2b4b73e5d
-
SHA512
c04d65684c655af6c33c113291a503437c36bd25fc8ac1694671459065c32c07696c0644ec9cd0cda5abc488e1495365b1f577b42c11a0059b18e0f81d71e74a
Score
10/10
Malware Config
Extracted
Path
C:\how_to_back_files.html
Ransom Note
<html>
<style type="text/css">
body {
background-color: #404040;
}
{
margin: 0;
padding: 0;
}
h1, h3{
text-align: center;
text-transform: uppercase;
font-weight: normal;
}
/*---*/
.tabs1{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs1 .head{
text-align: center;
float: top;
text-transform: uppercase;
font-weight: normal;
display: block;
padding: 5px;
color: #FF0000;
background: #303030;
}
.tabs1 .identi {
margin-left: 0px;
line-height: 13px;
font-size: 13px;
text-align: center;
float: top;
display: block;
padding: 15px;
background: #303030;
color: #DFDFDF;
}
/*---*/
.tabs{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs .tab{
float: left;
display: block;
}
.tabs .tab>input[type="radio"] {
position: absolute;
top: -9999px;
left: -9999px;
}
.tabs .tab>label {
display: block;
padding: 6px 21px;
font-size: 18x;
text-transform: uppercase;
cursor: pointer;
position: relative;
color: #FFF;
background: #4A83FD;
}
.tabs .content {
z-index: 0;/* or display: none; */
overflow: hidden;
width: 800px;
/*padding: 25px;*/
position: absolute;
top: 32px;
left: 0;
background: #303030;
color: #DFDFDF;
opacity:0;
transition: opacity 400ms ease-out;
}
.tabs .content .text{
width: 700px;
padding: 25px;
}
.tabs>.tab>[id^="tab"]:checked + label {
top:0;
background: #303030;
color: #F5F5F5;
}
.tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] {
z-index: 1;/* or display: block; */
opacity: 1;
transition: opacity 400ms ease-out;
}
</style>
<head>
<meta charset="utf-8">
<title>HOW TO DECRYPT YOUR FILES</title>
</head>
<body>
<div class="tabs1">
<div class="head" ><h3>Your personal ID</h3></div>
<div class="identi">
<pre>��9A F1 73 C9 1D 46 A0 D6 4D 19 E8 DE 3A DF 8B C9
60 C3 34 B3 79 0C F7 8D 2B EE 90 FC 55 61 27 53
55 B9 97 AE 65 15 9A D8 69 33 B7 81 3A 27 1C 2A
A6 53 DE D8 C0 A6 D3 E1 B0 F9 D0 5A 31 4D 87 67
CF 42 77 64 45 56 B7 8B 21 EE 89 AB E5 72 58 C6
88 43 0A 37 DB 5B 98 2C 0E 25 38 89 C5 9D 32 07
9A 80 23 46 07 54 82 B0 2D 53 94 33 EB 3A 70 67
21 5B AC 8D EF AF E7 05 62 C7 38 E3 9E 9C 41 F8
14 B0 AE FB F9 F7 C8 D4 14 2E F3 82 1A 32 09 1B
BE FD 19 01 8A 0A 2F 68 EA CA 9F 1B ED 79 78 48
C3 DD 9B 2D B0 C8 97 A9 54 2D 37 F1 18 51 BD 94
97 99 BD BE 92 B1 0A FA 43 F1 F5 EF 75 BA 08 F0
06 E6 4E DB 8A C6 5E 92 B1 35 C2 67 91 9B BD 1B
01 82 13 CD 7D CB A9 DA 58 26 0B A4 01 E5 34 FE
2B 63 22 12 1F 39 72 84 49 23 EB D7 CD 7B 72 3B
8C 48 9A C1 FC 20 91 D3 4A D4 FB 3F 27 A6 ED 41
</p>
</pre><!-- !!! dont changing this !!! -->
</div>
</div>
<!-- -->
<div class="tabs">
<!--tab-->
<div class="tab">
<input type="radio" name="tabs" checked="checked" id="tab1" />
<label for="tab1">English</label>
<div id="tab-content1" class="content">
<h1>☣ Your files are encrypted! ☣</h1>
<hr/>
<h3> ⬇ To decrypt, follow the instructions below. ⬇ </h3>
<br/>
<div class="text">
<!--text data -->
To recover data you need decryptor.</br>
To get the decryptor you should:</br>
<p>Send 1 crypted test image or text file or document to <span> <font color="FF0000">[email protected] </font></span></br>
(Or alternate mail <font color="FF0000"> [email protected] </font>)<p>
In the letter include your personal ID (look at the beginning of this document).</p>
We will give you the decrypted file and assign the price for decryption all files</p>
After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions
We can decrypt one file in quality the evidence that we have the decoder.</br>
<hr color=red>
<center><p style="color:#FF0000">MOST IMPORTANT!!!</p></center>
<center><p style="color:#FF0000"> Do not contact other services that promise to decrypt your files, this is fraud on their part! They will buy a decoder from us, and you will pay more for his services.
No one, except [email protected], will decrypt your files.</p></center>
<hr color=red>
<ul>
<li>Only [email protected] can decrypt your files</li>
<li>Do not trust anyone besides [email protected]</li>
<li>Antivirus programs can delete this document and you can not contact us later.</li>
<li>Attempts to self-decrypting files will result in the loss of your data</li>
<li>Decoders other users are not compatible with your data, because each user's unique encryption key</li>
</ul>
<!--text data -->
</div>
</div>
</div>
<!--tab-->
</ul>
<!--text data -->
</div>
</div>
<!--tab-->
</div>
</div>
</body>
</html>
���������������
Emails
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\LockMount.tiff csrss.exe File renamed C:\Users\Admin\Pictures\LockMount.tiff => C:\Users\Admin\Pictures\LockMount.tiff.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\SplitResume.crw => C:\Users\Admin\Pictures\SplitResume.crw.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\SyncTrace.tif => C:\Users\Admin\Pictures\SyncTrace.tif.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\UseUndo.raw => C:\Users\Admin\Pictures\UseUndo.raw.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\CheckpointImport.crw => C:\Users\Admin\Pictures\CheckpointImport.crw.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\CloseSkip.crw => C:\Users\Admin\Pictures\CloseSkip.crw.DREAM csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\csrss.exe" csrss.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Public\Recorded TV\desktop.ini csrss.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini csrss.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Public\Music\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Music\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Documents\desktop.ini csrss.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini csrss.exe File opened for modification C:\Users\Public\Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Links\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini csrss.exe File opened for modification C:\Users\Public\desktop.ini csrss.exe File opened for modification C:\Users\Public\Videos\desktop.ini csrss.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini csrss.exe File opened for modification C:\Users\Public\Downloads\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Videos\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Searches\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini csrss.exe File opened for modification C:\Users\Public\Libraries\desktop.ini csrss.exe File opened for modification C:\Users\Public\Documents\desktop.ini csrss.exe File opened for modification C:\Users\Public\Desktop\desktop.ini csrss.exe