Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2022 09:25

General

  • Target

    35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef.exe

  • Size

    170KB

  • MD5

    c6b7bfd71bd9266d2f6a7765d792e8f5

  • SHA1

    cfecd233b084e49d66ac63943e7370bdcb3afdef

  • SHA256

    35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef

  • SHA512

    0b0bba5bb84de2be5f983438ff05fdef4d66aff7302045858254a50b8e75fdd1329a9edd90ad463b0a94087c84f7fd93ac96bb8a688b6f159d5c2e5e845298a0

  • SSDEEP

    1536:J7kSVXrB7T0hoAOwC6NXFZcRGOgaRFOvA+v/T3YpKuz:9z1/0POX6NvPaRFOlv/k

Malware Config

Extracted

Path

C:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 12 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef.exe
    "C:\Users\Admin\AppData\Local\Temp\35fc2092e400f3e94384de93ca5f4293f1bc6607a76b20d4702c0372eea132ef.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:1020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1020-56-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1020-55-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1020-58-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1020-61-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1020-62-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1020-63-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1884-54-0x0000000000150000-0x0000000000180000-memory.dmp

    Filesize

    192KB