Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2022 10:07

General

  • Target

    03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe

  • Size

    369KB

  • MD5

    9913416c1e459d6aa98f851e4072aa3e

  • SHA1

    17b4bb3ca5b2484d69a3bfb2b235d8e0eafebbae

  • SHA256

    03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8

  • SHA512

    bf1daf7445760fb36c7cd128d05920c53d5da95d52e8f68591b1b03b60ab4e1eda44346e166d18898d12d6f0a5e54ce2754f0e6781bab6f472b8dfa0b33a269c

  • SSDEEP

    3072:fjzXnwdjWXxTi+VnFEeLIehTjRwfq7oKDPAa50wPU6j6/nI3nR:fjzA6xT3EeMCTjRwfqUKDPt5xe/nWnR

Malware Config

Extracted

Path

C:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
    "C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • Suspicious behavior: RenamesItself
      PID:4392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/708-132-0x0000000000A60000-0x0000000000AC2000-memory.dmp

    Filesize

    392KB

  • memory/4392-133-0x0000000000000000-mapping.dmp

  • memory/4392-134-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4392-136-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4392-137-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB