Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2022 10:07

General

  • Target

    03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe

  • Size

    369KB

  • MD5

    9913416c1e459d6aa98f851e4072aa3e

  • SHA1

    17b4bb3ca5b2484d69a3bfb2b235d8e0eafebbae

  • SHA256

    03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8

  • SHA512

    bf1daf7445760fb36c7cd128d05920c53d5da95d52e8f68591b1b03b60ab4e1eda44346e166d18898d12d6f0a5e54ce2754f0e6781bab6f472b8dfa0b33a269c

  • SSDEEP

    3072:fjzXnwdjWXxTi+VnFEeLIehTjRwfq7oKDPAa50wPU6j6/nI3nR:fjzA6xT3EeMCTjRwfqUKDPt5xe/nWnR

Malware Config

Extracted

Path

C:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 36 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
    "C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/904-55-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/904-56-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/904-58-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/904-59-0x0000000000409F20-mapping.dmp

  • memory/904-62-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/904-61-0x0000000075D31000-0x0000000075D33000-memory.dmp

    Filesize

    8KB

  • memory/904-63-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1544-54-0x0000000001000000-0x0000000001062000-memory.dmp

    Filesize

    392KB