Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2022 10:30

General

  • Target

    21b38af989d3f5f3bf16e0a7562b5bdb4c544b49c0711b8f055b4fb61e242eab.exe

  • Size

    390KB

  • MD5

    fec6f114419bfb3182ce771e7e4cd384

  • SHA1

    c63f0ce447c63fe232e6ba45d259110f167d6746

  • SHA256

    21b38af989d3f5f3bf16e0a7562b5bdb4c544b49c0711b8f055b4fb61e242eab

  • SHA512

    27960a22c708990fcf3878d7a65ccea44bcea554c565d166d8df590dc36b9ab5c3229a73168cc8fe6ce3241b3732ab181ce44c3fb1144e4d63972d71b66f895e

  • SSDEEP

    6144:B1iTvDacVTkrzy8FdikDUWrZJyTWZZDmehT4ZyPsr3YUkDMB2fukylSxpY0:Iu8KikDByT1ClylSx1

Malware Config

Extracted

Path

C:\readme.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ Your ID ���������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
URLs

http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 29 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21b38af989d3f5f3bf16e0a7562b5bdb4c544b49c0711b8f055b4fb61e242eab.exe
    "C:\Users\Admin\AppData\Local\Temp\21b38af989d3f5f3bf16e0a7562b5bdb4c544b49c0711b8f055b4fb61e242eab.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\21b38af989d3f5f3bf16e0a7562b5bdb4c544b49c0711b8f055b4fb61e242eab.exe
      "{path}"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:2008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-54-0x00000000008A0000-0x0000000000908000-memory.dmp

    Filesize

    416KB

  • memory/1660-55-0x0000000075F51000-0x0000000075F53000-memory.dmp

    Filesize

    8KB

  • memory/1660-56-0x00000000004C0000-0x00000000004E0000-memory.dmp

    Filesize

    128KB

  • memory/1660-57-0x0000000004080000-0x00000000040E6000-memory.dmp

    Filesize

    408KB

  • memory/1660-58-0x0000000000540000-0x0000000000552000-memory.dmp

    Filesize

    72KB

  • memory/2008-59-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2008-60-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2008-62-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2008-66-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2008-67-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB