Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2022 09:24

General

  • Target

    1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393.exe

  • Size

    72KB

  • MD5

    0a394ea5a6a326d2b8a0f7d6ba4bbd82

  • SHA1

    c1e1ad4bab9727d1ff3a0788c51edc223f53f097

  • SHA256

    1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393

  • SHA512

    f7388719ada155e354434b57b438e20c23db44ddf3cf1b4552715d371aec3c5f834992c08eca63b58051472a92996b4d2bb51b1fa5a7671f6c33c731c20bb902

  • SSDEEP

    768:7BcNSpIMgsDi8giO5KLC8MkGPXsADPGL69QKN/ZfdV1+nAZjEMzsyy:Fc4IuDdgN5TkGP8A7EUnhV+nAZjE4a

Malware Config

Extracted

Path

C:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 28 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393.exe
    "C:\Users\Admin\AppData\Local\Temp\1b82a0c989856a73ff5c46b1f578b8dadc94d40d265a5ef891313d6f73948393.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:2260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2260-134-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2260-136-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2260-137-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2764-132-0x0000000000740000-0x0000000000756000-memory.dmp

    Filesize

    88KB