Analysis
-
max time kernel
166s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31/07/2022, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win7-20220715-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
csrss.exe
Resource
win10v2004-20220721-en
5 signatures
150 seconds
General
-
Target
csrss.exe
-
Size
55KB
-
MD5
97de24939a69d700be5efbfa388b32ca
-
SHA1
10fb3bb9a8060069770272dacb96a3756a536807
-
SHA256
6455f22ea582d86f85a968a6623cbb53bd81f1ad0dd22c98f62a07e2b4b73e5d
-
SHA512
c04d65684c655af6c33c113291a503437c36bd25fc8ac1694671459065c32c07696c0644ec9cd0cda5abc488e1495365b1f577b42c11a0059b18e0f81d71e74a
Score
10/10
Malware Config
Extracted
Path
C:\how_to_back_files.html
Ransom Note
<html>
<style type="text/css">
body {
background-color: #404040;
}
{
margin: 0;
padding: 0;
}
h1, h3{
text-align: center;
text-transform: uppercase;
font-weight: normal;
}
/*---*/
.tabs1{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs1 .head{
text-align: center;
float: top;
text-transform: uppercase;
font-weight: normal;
display: block;
padding: 5px;
color: #FF0000;
background: #303030;
}
.tabs1 .identi {
margin-left: 0px;
line-height: 13px;
font-size: 13px;
text-align: center;
float: top;
display: block;
padding: 15px;
background: #303030;
color: #DFDFDF;
}
/*---*/
.tabs{
width: 800px;
display: block;
margin: auto;
position: relative;
}
.tabs .tab{
float: left;
display: block;
}
.tabs .tab>input[type="radio"] {
position: absolute;
top: -9999px;
left: -9999px;
}
.tabs .tab>label {
display: block;
padding: 6px 21px;
font-size: 18x;
text-transform: uppercase;
cursor: pointer;
position: relative;
color: #FFF;
background: #4A83FD;
}
.tabs .content {
z-index: 0;/* or display: none; */
overflow: hidden;
width: 800px;
/*padding: 25px;*/
position: absolute;
top: 32px;
left: 0;
background: #303030;
color: #DFDFDF;
opacity:0;
transition: opacity 400ms ease-out;
}
.tabs .content .text{
width: 700px;
padding: 25px;
}
.tabs>.tab>[id^="tab"]:checked + label {
top:0;
background: #303030;
color: #F5F5F5;
}
.tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] {
z-index: 1;/* or display: block; */
opacity: 1;
transition: opacity 400ms ease-out;
}
</style>
<head>
<meta charset="utf-8">
<title>HOW TO DECRYPT YOUR FILES</title>
</head>
<body>
<div class="tabs1">
<div class="head" ><h3>Your personal ID</h3></div>
<div class="identi">
<pre>��2B 2B B4 76 DA 45 AE B4 4C 16 5D 78 B2 B2 A4 F0
25 14 1C 40 87 A2 20 2D C3 BE 9D 1B 16 EB 65 00
7C 37 28 60 35 F6 81 26 25 93 55 F2 61 54 5A C7
B6 7B 01 D5 A5 54 38 6E A8 B1 C3 D5 EE 03 52 BD
F9 77 4B 24 F3 66 B0 91 FA FF E0 86 2B CB 8A 22
19 3C D4 BF C5 65 9D 96 82 A6 33 46 92 69 85 A8
56 9F DB B4 7B F7 D4 36 D2 4D CB 4C D9 C0 A4 D3
A3 10 1E 1B 3C E8 44 F8 FB B5 C8 F5 D7 0B F8 0D
A5 D8 E0 E6 57 3E D0 8F 22 3C 80 A7 B1 C2 96 C7
07 EC 81 42 76 04 26 15 4D 91 57 39 F6 CE DA 91
1C 69 40 CE F3 1C 61 3D 7B 9A 05 6E C1 F3 03 4B
93 8A 17 8B E8 7A 00 74 03 4E 38 27 00 90 21 B8
26 2C 1F E5 7D 46 E5 3A CF 3F 9A 36 20 B0 B6 C9
CF B3 8B 00 57 11 EB 6D C5 53 F1 E6 BB 3B EC CD
E1 10 B0 CE B0 63 3F 8A C5 AB F4 F2 C8 14 BF A3
7B B3 E8 AB 04 7E DE 02 83 4B 11 65 BA EC 44 82
</p>
</pre><!-- !!! dont changing this !!! -->
</div>
</div>
<!-- -->
<div class="tabs">
<!--tab-->
<div class="tab">
<input type="radio" name="tabs" checked="checked" id="tab1" />
<label for="tab1">English</label>
<div id="tab-content1" class="content">
<h1>☣ Your files are encrypted! ☣</h1>
<hr/>
<h3> ⬇ To decrypt, follow the instructions below. ⬇ </h3>
<br/>
<div class="text">
<!--text data -->
To recover data you need decryptor.</br>
To get the decryptor you should:</br>
<p>Send 1 crypted test image or text file or document to <span> <font color="FF0000">[email protected] </font></span></br>
(Or alternate mail <font color="FF0000"> [email protected] </font>)<p>
In the letter include your personal ID (look at the beginning of this document).</p>
We will give you the decrypted file and assign the price for decryption all files</p>
After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions
We can decrypt one file in quality the evidence that we have the decoder.</br>
<hr color=red>
<center><p style="color:#FF0000">MOST IMPORTANT!!!</p></center>
<center><p style="color:#FF0000"> Do not contact other services that promise to decrypt your files, this is fraud on their part! They will buy a decoder from us, and you will pay more for his services.
No one, except [email protected], will decrypt your files.</p></center>
<hr color=red>
<ul>
<li>Only [email protected] can decrypt your files</li>
<li>Do not trust anyone besides [email protected]</li>
<li>Antivirus programs can delete this document and you can not contact us later.</li>
<li>Attempts to self-decrypting files will result in the loss of your data</li>
<li>Decoders other users are not compatible with your data, because each user's unique encryption key</li>
</ul>
<!--text data -->
</div>
</div>
</div>
<!--tab-->
</ul>
<!--text data -->
</div>
</div>
<!--tab-->
</div>
</div>
</body>
</html>
���������������
Emails
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ReceivePing.tiff csrss.exe File renamed C:\Users\Admin\Pictures\ReceivePing.tiff => C:\Users\Admin\Pictures\ReceivePing.tiff.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\UnprotectComplete.crw => C:\Users\Admin\Pictures\UnprotectComplete.crw.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\BlockMove.crw => C:\Users\Admin\Pictures\BlockMove.crw.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\CompleteAssert.png => C:\Users\Admin\Pictures\CompleteAssert.png.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\DebugSwitch.crw => C:\Users\Admin\Pictures\DebugSwitch.crw.DREAM csrss.exe File opened for modification C:\Users\Admin\Pictures\DismountSearch.tiff csrss.exe File renamed C:\Users\Admin\Pictures\DismountSearch.tiff => C:\Users\Admin\Pictures\DismountSearch.tiff.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\UpdateUnblock.png => C:\Users\Admin\Pictures\UpdateUnblock.png.DREAM csrss.exe File renamed C:\Users\Admin\Pictures\ClearMove.crw => C:\Users\Admin\Pictures\ClearMove.crw.DREAM csrss.exe File opened for modification C:\Users\Admin\Pictures\EnableConvertFrom.tiff csrss.exe File renamed C:\Users\Admin\Pictures\EnableConvertFrom.tiff => C:\Users\Admin\Pictures\EnableConvertFrom.tiff.DREAM csrss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\csrss.exe" csrss.exe -
Drops desktop.ini file(s) 24 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Documents\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini csrss.exe File opened for modification C:\Users\Public\desktop.ini csrss.exe File opened for modification C:\Users\Public\Music\desktop.ini csrss.exe File opened for modification C:\Users\Public\Downloads\desktop.ini csrss.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Searches\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini csrss.exe File opened for modification C:\Users\Public\Videos\desktop.ini csrss.exe File opened for modification C:\Users\Public\Libraries\desktop.ini csrss.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini csrss.exe File opened for modification C:\Users\Public\Documents\desktop.ini csrss.exe File opened for modification C:\Users\Public\Desktop\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Videos\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Music\desktop.ini csrss.exe File opened for modification C:\Users\Admin\Links\desktop.ini csrss.exe